Abstract: - As we can see today the new technology provides many facilities and fast communication, such as internet. We must think how the information transfers from the source to the destination. In fact, there is a device who mange this operation and called router, this device explore the path from the source to the destination in low cost. However, In this report we will go to present one of the most popular algorithm use in the routing its Distance Vector algorithm which is the basis of the well-known Routing Information Protocol (RIP) then we will go to explain how this protocol works what is the problem, and how we can manage this problem and solve it, when use this protocol . After that, we will go to find the advantage and disadvantage with this protocol and compare it with another protocol. Finally, find the accuracy of this algorithm.
Keywords: Routing Protocol, Distance vector algorithm, Routing information protocol, Open shortest path protocol.
I. INTRODUCTION
The traffic is one of the most problems in the networks and to avoid the congestion in the network and delver the data from the source to the destination with short path need an algorithm that implement to get the optimal path. So, now we know what the route is and it’s not necessary to get the best path it is depending on the algorithm was applied. Furthermore, the data when transfer from network to network there is a router who decides which path that the packet will take and the router at least will be connect with two networks. The router will take any place in the network and his works to create and enhance the routing table. In fact, there are conditions that decide the route, distance measurement and cost algorithm to determin...
... middle of paper ...
... Garza, (2010, August 4th). RIP Protocol Tutorials[online]. Available: http://www.ehow.com/list_6812685_rip-protocol-tutorials.html
[3] D.Parker.( 2006,October 5th). Routing protocol [online]. Available: http://www.windowsnetworking.com/articles_tutorials/Routing-Protocols.html
[4] T.P. Lambrou and C.G. Panayiotou,(2009, March 4th). Survey on Routing Techniques supporting Mobility in Sensor Networks [online]. Available: http://www.hindawi.com/journals/asp/2009/750657.htm1.
[5] B.WANG, J. ZHANG, W. CHEN, and Y.fei GUO, “A Fast Reroute Mechanism for RIP Protocol,” Circuits, Communications and Systems, 2009. PACCS '09. Pacific-Asia Conference, pp. 74 – 77, 2009.
[6] D. Pei, D. Massey, and L.Zhang, “Detection of Invalid Routing Announcements in RIP Protocol,” Global Telecommunications Conference, 2003. GLOBECOM '03. IEEE. Vol. 3, pp. 1450 – 1455, 2003.
Routing scheme means to find a path from once place to another on which packets can travel. In most of the cases, we need multiple routers in order to route the packet to the destination. Routing contains three elements:
What is done to information to send it from one location to another on the Internet? It is broken into packets that travel across the internet and the packets take the most avaiable and efficient path and eventually all come together where they are suppose to be.
Johnson, D., Maltz, D. (1996). Dynamic Source Routing in Ad-hoc Wireless network. Print ISBN: 0 79239697 0
6) Michele Zorzi, “Wireless Sensor and networks: Recent trends and Research Issues’’, University of Padova, Italy, IEEE communication society, Poland, April 28-30, 2008.
An Open Shortest Path First (OSPF) protocol enhancement to save energy using Energy Aware Routing (EAR) strategy
Spanning tree protocol is a protocol that prevents loops that are not wanted in a network. In order for a network to work properly it has to have only one active path between two network stations. If there are multiple active paths between stations loops can and will occur. When loops occur, there can sometimes be duplicate messages in the network. The loops are created by the network and if the devices that connect the network segments are all configured to forward, they will continuously forward frames into an endless network loop. If there are enough loops going then a frame will not reach its destination. The reason duplicate messages occur is because sometimes switches will see situations appear on both sides of it. When this occurs that is when spanning tree protocol comes in. In order to shut down the loops bridges and switches exchange BPDU messages with other bridges and switches to detect loops and then remove them by shutting down selected bridge interfaces. BPDU is short for bridge protocol data unit. Bridge protocol data units are part of the spanning tree protocol and they help describe and identify the parts of a switch port. The bridge protocol data unit allows switches to obtain information about each other. All the switches gather information from each other by exchanging data messages. In order for them to exchange messages they have to elect a root switch for the topology. The root switch has to be unique. The way they elect they have to have a unique switch for every local area network segment. To exchange messages they have to remove all loops by putting them in a backup state. Now to talk about states there is 5 different states. Two of the five states do not participate in frame forwarding. Frame forwarding is what the three main states do. The three main states are listening, learning, and forwarding. The other 2 are blocking state and disabled state. When you enable the spanning tree protocol the network goes through the blocking state and then the listening state and learning state are enabled after being turned on. If the protocol is properly configured the ports are stabilized to the forwarding or blocking state. The blocking state does not participate in the frame forwarding. It removes frames that are received from the attached segment. It also discards frames from another port for forwarding.
Perhaps the most redundant, fault-tolerant of all network topologies is the mesh LAN. Each node is connected to every other node for a true point-to-point connection between every device on the network.
... congestion collapse are solved by timer improvements and congestion control mechanism in modern implementations of TCP.
This entire information gathering is the beginning of the Logical design of the network. It will determine many different aspects of the network and form a basic starting point to make other major decisions. From this information the IP structure of the networ...
Transportation system is a dynamic system. Information about traffic must be regularly updated to keep pace with ever-changing transportation system. Data must be collected and analyzed systematically to get representative information.
The Internet of Things (IoT) is the network of physical objects accessed through the Internet. The Network of interconnected objects harvests information from the environment (sensing) and interacts with the physical world (actuation/command/control), uses existing Internet standards to provide services for information transfer, analytics, applications and communications (Jiong et al. 2012).
3. 135.46.52.2 Ans: The given address is lower than 135.45.56.0/22. The default route will be used and the packets will be routed out over router 1. 4. 192.53.40.7 Ans: 192.53.40.7 and 255.255.254.0= 192.53.40.0. it matches 192.53.40.0/23 routing entry and the packet will be routed out over router 1. 5. 192.53.56.7 Ans: 192.53.56.7 and 255.255.254.0 = 192.53.56.0. The default route will be used and that packet will be routed out over router 2. QUES 2. A Large number of consecutive IP address are available starting at 198.16.0.0. Suppose that four organizations, A, B, C, D request 4000, 2000, 4000, and 8000 addresses, respectively, in that order. For each of these, give a. the first IP address assigned, b. the last IP address assigned c. and the mask in the w.x.y.z/s
4. A. Crespo and H. Garcia-Molina. Routing indices for peer-to-peer systems. In Proc. of the 28th International Conference on Distributed Computing Systems, July 2002.
TCP/IP is a network model which enables the communication across the Internet. The most fundamental protocol on which the Internet is built. This is made up of the 2 common networking protocols, TCP, for Transmission Control Protocol, and IP, for Internet Protocol. TCP maintains and handles packet flow linking the systems and IP protocol has the ability to handle the routing of packets. However The TCP/IP stack consists of 5 layers first being application layer, the transport layer, then the network layer, the link layer and finally the physical layer. The assignment focuses on the three middle layers and is divided into five parts. Firstly explaining how the TCP and UDP the most vital protocols needed to deliver and communicate.
Due to the demand for the internet to be fast, networks are designed for maximum speed, rather than to be secure or track users (“Interpol” par. 1). The adage of the adage.... ... middle of paper ... ...