Professional Documents
Culture Documents
ACN Unit4
ACN Unit4
RIP
The well known interior protocols are RIP (Routing information protocol) and OSPF (Open
Shortest Path First). Whereas the popular exterior protocol used popularly is BGP (Border
Gateway Protocol).
Routing inside any autonomous system is referred to as intradomain routing. Routing between
autonomous systems is referred to as interdomain routing) and BGP is used for upgrading the
routing tables for the routers which join multiple AS together.
Each node knows how to reach any other node. When a new router is added to a network it
initializes its routing table. Such a table consists of the information only about the directly
attached networks and the corresponding hop counts. The next-hop field i.e which identifies the
next router is empty.
RIP work is a combination of a routing database that stores information on the fastest route from
computer to computer.
An update process that enables each router to tell other routers which route is the fastest from its
point of view and an update algorithm that enables each router in order to update its database
with the fastest route communicated from the neighboring routers.
OSPF
Routers connect networks using the Internet Protocol (IP), and OSPF (Open Shortest Path First)
is a router protocol used to find the best path for packets as they pass through a set of connected
networks.
The OSPF (Open Shortest Path First) protocol is one of a family of IP Routing protocols, and is
an Interior Gateway Protocol (IGP) for the Internet, used to distribute IP routing information
throughout a single Autonomous System (AS) in an IP network.
BGP
BGP is known as an exterior gateway protocol. It was designed to share routing information
between disparate networks, known as autonomous systems (ASes). When multiple BGP-derived
paths exist, the protocol chooses a path to send traffic based on several criteria, including the
following:
• the highest locally derived preference number, called a weight;
• the path with the highest local preference;
• path origin (network or aggregate);
• shortest AS path to the destination network;
• lowest multiexit discriminator; and
• preferred paths coming from intra-AS, such as internal BGP, or extra-AS, such as external
BGP.
One of the major disadvantages of traditional IP routing is per-packet inspection – each packet
needs to have its IP header information compared with the routing table before the router decides
which interface to forward the packet out of.
Traditional routing algorithms cannot satisfy the requirements of an ad hoc network, because of
the dynamic topology and the limited bandwidth that characterize these networks.
Sensitive traffic - Sensitive traffic is traffic the operator has an expectation to deliver on time.
This includes VoIP, online gaming, video conferencing, and web browsing. Traffic management
schemes are typically tailored in such a way that the quality of service of these selected uses is
guaranteed, or at least prioritized over other classes of traffic. This can be accomplished by the
absence of shaping for this traffic class, or by prioritizing sensitive traffic above other classes.
Best-effort traffic - Best effort traffic is all other kinds of non-detrimental traffic. This is traffic
that the ISP deems isn't sensitive to Quality of Service metrics (jitter, packet loss, latency). A
typical example would be peer-to-peer and email applications.[9] Traffic management schemes
are generally tailored so best-effort traffic gets what is left after sensitive traffic.
Undesired traffic- This category is generally limited to the delivery of spam and traffic created
by worms, botnets, and other malicious attacks. In some networks, this definition can include
such traffic as non-local VoIP (for example, Skype) or video streaming services to protect the
market for the 'in-house' services of the same type. In these cases, traffic classification
mechanisms identify this traffic, allowing the network operator to either block this traffic
entirely, or severely hamper its operation.
IP over ATM
Asynchronous Transfer Mode (ATM) is a WAN technology that uses fixed length cells. ATM
cells are 53 bytes long, with a 5-byte header and 48-byte data portion. ATM allows reliable
network throughput compared to Ethernet.
Asynchronous Transfer Mode (ATM) is a cell-switching, connection-oriented technology. In
ATM networks, end stations attach to the network using dedicated full duplex connections. The
ATM networks are constructed using switches, and switches are interconnected using dedicated
physical connections.
The crucial difference between ATM and IP protocols is that ATM is connection-oriented while
IP is connectionless. This means that the establishment of a connection between two endpoints in
ATM defines the route all cells related to that connection must travel.
When the IP packet arrives at the router in the ATM network, the IP packet is encapsulated into
the ATM cells. The number of ATM cells required to encapsulated an IP packet depends on the
size of the IP packet and the size of cells in the ATM network.
Following are the most common protocols of SAN (Storage Area Network):
FCP (Fibre Channel Protocol) -It is the most commonly used protocol of the Storage Area
Network. It is a mapping of SCSI command over the Fibre Channel (FC) network.
ISCSI - It stands for Internet SCSI or Internet Small Computer System Interface. It is the second-
largest block or SAN protocol. It puts the SCSI commands inside an ethernet frame and then
transports them over an Internet protocol (IP) ethernet.
FCoE - FCoE stands for "Fibre Channel Over Internet". It is a protocol which is similar to the
iSCSI. It puts the Fibre channel inside the ethernet datagram and then transports over an IP
Ethernet network.
NVMe -NVMe stands for Non-Volatile Memory Express. It is also a protocol of SAN, which
access the flash storage by the PCI Express bus.