Implementation of RIPv1 and OSPF Routing Protocol, DHCP, DNS, and HTTP Configurations in CISCO Packet Tracer

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysis of RIPv2, OSPF, EIGRP Configuration on router Using CISCO Packet tracer

In this modern era the computer communication network is growing rapidly, Computer communication networks are based on a technology that provides the technical infrastructure, where routing protocols are used to transmit packets across the Internet .Routing protocols specify how routers communicate with each other by spreading information. The router has prior knowledge about the adjacent netwo...

متن کامل

Performance Analysis of RIPv2 protocol in Wired Network Using Cisco Packet Tracer

In this research performance of RIPv2 Protocol is optimized using enhanced routing parameter like routing Update, convergence time, invalid timer, hold timer, Flushout timer .By review of RIP protocol the researcher use these value as 30sec update Timer, 180 sec invalid timer and 180 sec hold timer and 240 sec flushout timer, which result in low QoS and slow routing. This research paper mainly ...

متن کامل

development and implementation of an optimized control strategy for induction machine in an electric vehicle

in the area of automotive engineering there is a tendency to more electrification of power train. in this work control of an induction machine for the application of electric vehicle is investigated. through the changing operating point of the machine, adapting the rotor magnetization current seems to be useful to increase the machines efficiency. in the literature there are many approaches wh...

15 صفحه اول

A Methodology for OSPF Routing Protocol Verification

The emerging cloud computing paradigm has driven the creation of data centers that consist of hundreds of thousands of servers and that are capable of supporting a large number of distinct services. Data intensive systems have a real need for tens to hundreds of Gbps of bandwidth and deterministic Quality of Service (QoS), which is satisfied by thousands of servers interconnected together. Secu...

متن کامل

On the Vulnerabilities and Protection of OSPF Routing Protocol

This paper analyzes both the strong points and weak points of OSPF routing protocol from security perspective. On its strong points, we abstract its features of information least dependency and information hiding, which make it very robust and fault resilient, even when facing certain malicious attacks. On its weak points, we take a pragmatic look at various problems centering round secure rout...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IJIREEICE

سال: 2019

ISSN: 2321-5526,2321-2004

DOI: 10.17148/ijireeice.2019.7401