Tuesday, May 5, 2020

OSPF Transport Instance Extensions

Question: Discuss about the OSPF Transport Instance Extensions. Answer: Introduction: The communication protocols are the basic set of rules which are applicable when there are two or more than two components in the network of the communication system (Kerenidis et al., 2015). The components or the entities transfer the data through several physical devices. The protocol or the set of rules are defined in such a manner that the, syntaxes and the semantics could be defined by them easily. The error recovery functions are also performed by these protocols. The protocols can be imposed by either the software or the hardware or can be done by collaborating both the hardware and the software. The protocols are necessary at all the levels of a telecommunication network. There are set of rules that are defined for the hardware. In addition to this the networking model also has several levels. A protocol is defined separately for the different levels in the networking models. These protocols are to be recognized and followed by the entities that are available at both ends of the connections. The analyzer is basically a program in associated with a collection of the hardware that are passing or logging the traffic activities at all the points of a digital network (Escobar et al., 2014). For analyzing the protocols an experimental model is to be used. The method can be used for gathering the evidences regarding the transitional states. The system is concerned in general with the utilization of the calculation methods for the functions. The network probe is one the analyzer tools that can be used for monitoring the real time traffic within the network. This is used for identifying the causes of the lag that the network is facing. The hub is the tool that can be used to connect with the server that is in-line with the hub. This can done as the data packets that are arriving in a single point can be distributed over to the other parts of the network (Naoui et al., 2014). This would increase the traffic of the network and it would be observed by all the nodes in the network. In a network that is comprising of the only the hub and the switches are absent in the network, the data or the traffic that would be transferred over the network would be visible to all the components of that network. In this situation the analyzer can be plugged in at any point within the network and the network attributes could be easily available. In the scenario that is provided is of a pharmaceutical firm. The firm is comprising of 11 workstations and a hub having 24 ports. To tap into the network a switch can be used at any point. This possible as because the devices are connected to the port with their MAC addresses. The data would b e transferred to only those devices. The machines would be connected to the switches with the help of their MAC addresses. The benefits of using a Switch are (Vilar, Marti Magne, 2015): A connection of a hub can be split and provided to various other sources in the network with the help of a switch. In addition to this the switches are capable of monitoring the network. In a real life scenario a switch is very essential for using in a network. The difference between the distance routing vector and the link state vector are (Ibrahim et al., 2014): Firstly the link state router is faster in converging while, the distance routing vector is slower than the link state vector in comparison. The robustness of the distance routing vector is more than the link state vector. The link state vector has huge infrastructural requirements, whereas the distance routing vector as requirements that are very small in comparison with the link state vector. The distance routing vector uses Bellman-Ford algorithm and the link state vector uses the shortest path first algorithm. The link state vector supports the class less as well as the class full subnets but only the class full subnets are supported by the distance routing vector. The link state vector can perform several functions such as creating the topology table, routing table and the neighbor table. But, the distance routing vector can only perform the task of creating the routing table. The memory requirements of the distance routing vector is less in comparison to the link state vector. It is easier to configure the distance vector. But the configuration of the link state vector is much more complex. The examples of some distance routing vector are IGRP and RIP. The examples of link state routing are IS-IS, OSPF. The total number of host addresses that are possible technically are 2046, but the required number of addresses are, 1024 per building. Hence, there remains a scope for more addresses per building. Therefore, it would not be a problem even if the number of addresses per building is increase from 1024. The QoS is the quality of the service in a TCP/IP network (Xu et al., 2015). It is the set of rules that is sued for setting the priority of the different operation that are to be performed in the network. It also performs the task of assigning the different type of tasks for the different components of the network. It also performs the task of providing the different order of priority to the different data packets. It also sets the priority of the different MAC addresses. In addition to this this the QoS also monitors the performances of the system. There are various kind of header files that are present in the data packets (Joshi et al., 2013). The header files provide various types of information for the network in order to obtain the information about the data packets. Some of the header files are IP Precedence, TOS, ECN and Diffserv. The IP Precedence provide the network status such as: The TOS is the type of services and defines the type of service of the data packets. The ECN is the Explicit Network Congestion. It provides the congestion notifications about the traffic in the network. The Diffserv is the differentiated services of the computer networks. It differentiates among the different task in the computer network. The main differences among the header files are the number of bits and their functionality. The IP Precedence consists of 3 bits, the TOS consists of 8 bits, the ECN is 1 bit only and the the Diffserv varies from 2-7 bits. In addition to this the IP precedence is used for the different status of the network, the TOS is used for the type of service, The ECN provides the network traffic report and the Diffserv provides the differentiated services information. References Das, N., Modi, H., Islam, S. (2014, September). Investigation on architectures for power system communications between substations using IEC 61850. InPower Engineering Conference (AUPEC), 2014 Australasian Universities(pp. 1-6). IEEE. Escobar, S., Meadows, C., Meseguer, J., Santiago, S. (2014). State space reduction in the Maude-NRL protocol analyzer.Information and Computation,238, 157-186. Ibrahim, D. M., Fahmy, M. M., ElTobely, T. E., Sallam, E. A. (2014). Enhancing the vector-based forwarding routing protocol for underwater wireless sensor networks: a clustering approach. InThe Tenth International Conference on Wireless and Mobile Communications (ICWMC). Joshi, J., Gupta, S., Gupta, P., Singh, N., Kumari, M. (2013). Multi Protocol Label Switching with Quality of Service in High Speed Computer Network.International Journal Of Engineering And Innovative Technology (IJESIT),2(2). Kerenidis, I., Laplante, S., Lerays, V., Roland, J., Xiao, D. (2015). Lower bounds on information complexity via zero-communication protocols and applications.SIAM Journal on Computing,44(5), 1550-1572. Naoui, A., Hadj, S. B., Naoui, A., Afilal, L. E., Abdelkrim, M. N. (2014). Performance Evaluation of Diagnosis System According to Various Structures of Networked Control System.International Journal on Sciences and Techniques of Automatic Control engineering-IJ-STA,8(1). Roy, A., Lindem, A., Mirtorabi, S. (2014). OSPF Transport Instance Extensions. Verdiere, A., Igarashi, Y., Lys, T., Lavenu, C., Yi, J., Herberg, U., ... Dean, J. (2016). The Lightweight On-demand Ad hoc Distance-vector Routing Protocol-Next Generation (LOADng). Vilar, R., Mart, J., Magne, F. (2015, September). Point to Multipoint Wireless Backhaul Systems for cost-effective small cell deployment. InMicrowave Conference (EuMC), 2015 European(pp. 1092-1095). IEEE. Xu, L., Yu, X., Feng, Y., Han, F., Hu, J., Tari, Z. (2015, March). A fast terminal sliding mode observer for TCP/IP network anomaly traffic detection. InIndustrial Technology (ICIT), 2015 IEEE International Conference on(pp. 28-33). IEEE.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.