Performance Analysis of RIPv2 protocol in Wired Network Using Cisco Packet Tracer

نویسنده

  • Jaswinder Kumar
چکیده

In this research performance of RIPv2 Protocol is optimized using enhanced routing parameter like routing Update, convergence time, invalid timer, hold timer, Flushout timer .By review of RIP protocol the researcher use these value as 30sec update Timer, 180 sec invalid timer and 180 sec hold timer and 240 sec flushout timer, which result in low QoS and slow routing. This research paper mainly focuses on to optimize above mentioned Routing Parameter to enhance QoS parameter and make RIP Protocol routing fast.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysis of RIPv2, OSPF, EIGRP Configuration on router Using CISCO Packet tracer

In this modern era the computer communication network is growing rapidly, Computer communication networks are based on a technology that provides the technical infrastructure, where routing protocols are used to transmit packets across the Internet .Routing protocols specify how routers communicate with each other by spreading information. The router has prior knowledge about the adjacent netwo...

متن کامل

The Role of Packet Tracer in Learning Wireless Networks and Managing IoT Devices

Wireless networks, Internet of Things (IoT), Internet of Everything (IoE), and smart homes have become extremely important terms in our present-day life. Most of the buildings, companies, institutions, and even homes depend onthese technologies for interaction, communication, automation, and everything surrounding humans. To understand the advanced topics in wireless networks and IoT devi...

متن کامل

Performance Analysis of Route Redistribution among Diverse Dynamic Routing Protocols based on OPNET Simulation

Routing protocols are the fundamental block of selecting the optimal path from a source node to a destination node in internetwork. Due to emerge the large networks in business aspect thus; they operate diverse routing protocols in their infrastructure. In order to keep a large network connected; the implementation of the route redistribution is needed in network routers. This paper creates the...

متن کامل

A performance comparison of MD5 authenticated routing traffic with EIGRP, RIPv2, and OSPF

Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermediate node is considered. Due to the major role that routing protocols play in computer network infrastructures, special cares have been given to routing protocols with built-in security constraints. In this paper, we co...

متن کامل

Securing AODV routing protocol against the black hole attack using Firefly algorithm

Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014