Monday, April 22, 2019

Routing Protocol Security OSPFv2 Dissertation Example | Topics and Well Written Essays - 750 words

Routing Protocol Security OSPFv2 - Dissertation exemplarUsing MD5 method to introduce a comparison between the security measures often associated with the theatrical role of OSPF v2 Routing protocol, it worked kinda well to implement a network structure, which made it possible to evaluate and assess the Project background research on OSPF v2 authentication security alongside highlighting the solution that was deemed reliable for the OSPF v2 authentication. Through the use of the Quagga softw ar, a network was implemented, which helped in testing, as well as evaluating OSPF v2 authentication. This project clearly demonstrate that OSPF as an interior gateway protocol, domiciliate route the Internet Protocol into a single routing domain. It showed that OSPF shtup gather a link- subject information from routers and be able to construct a network of topology maps, which argon more often than not used for determining routing table that is often presented in the internet layer. It w as besides shown that OSPF was designed in such a way that it can run on the variable length subnet masking, and it is overly capable of detecting each change deep down a topology such as any link failure and be able to converge onto a loop-free routing structure within seconds. This project besides demonstrated that the OSPF network might be subdivided into various routing areas for purposes of simplifying administration and optimization of traffic and for resource utilization. It also showed that OSPF does not make use of the TCP/IP transport protocol. It is instead encapsulated in the IP datagram. This contrasts with other(a) related routing protocols such as the Border Gateway protocol and the Routing Information protocol. It also became apparent that Router within the same broadcast domain often link from adjacencies whenever they need to detect each other. Such a detection takes place whenever a Router gets to identify itself within the hello OSPF protocol packet. This is often referred to as the bipartite state. this project, as well indicted that the OSPF makes use of the multicast, as well as the unicast in sending the link state updates and the hello packets. Recommendations for Future Research The current research demonstrated clearly that it is possible OSPF V2 Routing protocol can be used as an internet security measure. Given the focus of this study and previous studies on OSPF V2 Routing protocol and other earlier versions, it is expense recommending that there is need to migrate to IPv6 considering that the solution to the existing trouble which is OSPFv2 routing is to transfer to OSPFv3 and use IPsec Protocol between sites (WAN. It has been indicated that OSPF protocol when operated on other versions such as on IPv4, it operates more securely between routers. This provides an option to use varied authentication methods to give allowance to routers that are trusted to participate in routing. Although it has been noted that OSPFv3, wh en running on IPv6, does not any more support the protocol-internal authentication, it relies on the IPv6 protocol security (Tanenbaum, 2003). As often is the case, the OSPF version 3 would help introduce approximately modifications to the given IPv4 protocol implementation. Other than the virtual links, virtually all neighbor exchanges often exclusively make use of the IPv6 link-local addressing (Cisco Systems Inc, 2009). It is widely known that the IPv6 protocol always do run per link, and not based upon the subnet. It is worth contenting that all the IP prefix information has

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.