Performance Analysis of RIPv2 protocol in Wired Network Using Cisco Packet Tracer
نویسنده
چکیده
In this research performance of RIPv2 Protocol is optimized using enhanced routing parameter like routing Update, convergence time, invalid timer, hold timer, Flushout timer .By review of RIP protocol the researcher use these value as 30sec update Timer, 180 sec invalid timer and 180 sec hold timer and 240 sec flushout timer, which result in low QoS and slow routing. This research paper mainly focuses on to optimize above mentioned Routing Parameter to enhance QoS parameter and make RIP Protocol routing fast.
منابع مشابه
Analysis of RIPv2, OSPF, EIGRP Configuration on router Using CISCO Packet tracer
In this modern era the computer communication network is growing rapidly, Computer communication networks are based on a technology that provides the technical infrastructure, where routing protocols are used to transmit packets across the Internet .Routing protocols specify how routers communicate with each other by spreading information. The router has prior knowledge about the adjacent netwo...
متن کاملThe Role of Packet Tracer in Learning Wireless Networks and Managing IoT Devices
Wireless networks, Internet of Things (IoT), Internet of Everything (IoE), and smart homes have become extremely important terms in our present-day life. Most of the buildings, companies, institutions, and even homes depend onthese technologies for interaction, communication, automation, and everything surrounding humans. To understand the advanced topics in wireless networks and IoT devi...
متن کاملPerformance Analysis of Route Redistribution among Diverse Dynamic Routing Protocols based on OPNET Simulation
Routing protocols are the fundamental block of selecting the optimal path from a source node to a destination node in internetwork. Due to emerge the large networks in business aspect thus; they operate diverse routing protocols in their infrastructure. In order to keep a large network connected; the implementation of the route redistribution is needed in network routers. This paper creates the...
متن کاملA performance comparison of MD5 authenticated routing traffic with EIGRP, RIPv2, and OSPF
Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermediate node is considered. Due to the major role that routing protocols play in computer network infrastructures, special cares have been given to routing protocols with built-in security constraints. In this paper, we co...
متن کاملSecuring AODV routing protocol against the black hole attack using Firefly algorithm
Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014