Multiprotocol Network

Anonymous
timer Asked: Jul 3rd, 2018
account_balance_wallet $70

Question description

Hi,

Please an attached for more information about this paper. I would preferably have this done by selected (invited) writer! otherwise, i would like to have someone have a computer science, information security or cyber security background to complete this project. Please let me know if you have further questions.

Thank you

Network Proposal Paper Depicted below is a corporate network. The above network has RIPv2, OSPF, and EIGRP protocols in Intranet and is connected to two ISPs thru BGP protocol. As a consultant write a technical proposal to implement the following solutions. 1. 2. 3. 4. 5. 6. Create a multiprotocol operational network using EIGRP, OSPF, and RIPv2 protocol. Implement a secure update of OSPF and EIGRP protocol. Implement virtual link in one segment of the network Implement a redistribution solution Implement BGP connection to ISPs Implement a solution which avoids your network becoming a transit hub for BGP external routes Your paper must have a minimum of 3 pages and a maximum of 7 pages of text, excluding the required title page, bibliography and optional tables. Text must be Times New Roman, 12 point font, 1" margin on all sides, and double spaced. Students must follow "Publication Manual of the American Psychological Association, Fifth Edition (APA- 5)", also known as APA style or format. Only a Microsoft Word file will be accepted as the final submission; no HTML or PDF files allowed. All sources must be properly cited and must be credible. At least two sources must be Internet sources (for help in evaluating the credibility of web sources, go to www.umuc.edu/library/guides/evaluate.shtml). Once you have completed a good draft, it is strongly advised that you submit it to UMUC's Effective Writing Center (EWC). In order to allow sufficient time for their review, you need to submit the draft to EWC two weeks prior to the paper's due date.

Tutor Answer

paula9
School: University of Maryland

Attached.

Running head: MULTIPROTOCOL NETWORK

Multiprotocol Network
Student’s Name
Institutional Affiliation
Instructor
Date

1

MULTIPROTOCOL NETWORK

2
Introduction

In the modern world, the computer network is based on a technology whereby routing
protocols are used to transfer data across the Internet Routing protocol. A multiprotocol network
is designed in a discontinuous manner thus there is the implementation of classless protocol
RIPv2 on all the routers (Davis, 2014). Routing makes it possible to build the relevant routing
tables, learn of all routes on the network and make the necessary routing decisions. A Routing
protocol specifies how the routers in the network communicate hence useful in the selection of
routes between the nodes found in the network. The routing protocols in this proposal are RIPv2,
OSPF, and EIGRP. It is essential to understand that today’s networks do not support a classful
IP addressing when creating a multiprotocol network. Therefore, the network design of the
multiprotocol network uses classless RIP in all the routers.
Creating a multiprotocol operational network using EIGRP, OSPF, and RIPv2 protocol
Enhanced IGRP refers to an advanced distance vector that has some link-state protocols
properties. It addresses some limitations that are present in the protocols of conventional distance
vector routing such as high bandwidth consumption and slow convergence in a network
considered being in a steady state (El Idrissi et al…, 2017). OSPF was developed for use in
Internetworks that are based on Internet Protocol (IP) and is referred to as the IGP (Interior
Gateway Protocol). The distribution of routing information by OSPF takes place in routers found
in the autonomous system. RIPv2 is considered a distance-based routing protocol that uses the
metrics of router hop counts (Olifer & Olifer, 2005). The maximum hop count values that RIPv2
support is 15 and any router that exceeds 15 hops away are considered an unreachable network.
RIPv2 can support the Classless Inter-Domain Routing (CIDR) and subnet information.

MULTIPROTOCOL NETWORK

3

Moreover, RIPv2 is usually referred to as a classless protocol thus it can include the subnet
addresses in the updates found in the routing.
OSPF is an Interior Gateway Protocol (IGP) developed for use in Internet Protocol (IP)-based
internetworks. As an IGP, OSPF distributes routing information between routers belonging to a
single autonomous system (AS).
RIPv2 is Distance Vector Routing Protocols that use router hop counts as their metrics. It
supports a maximum hop count value of 15. Any router farther than 15 hops away is considered
to be unreachable.
Configuring RIPv2 (RIP NETWORK)
RouterA(config)#router rip
RouterA(config-router)#version 2
RouterA(config-router)#network 192.168.10.0
RouterA(config-router)#network 195.14.25.0
RouterA(config-router)#network 195.14.125.0
RouterA(config-router)#no auto-summary
RouterB(config)#router rip
RouterB(config-router)#version 2
RouterB(config-router)#network 192.168.20.0
RouterB(config-router)#network 195.14.25.0
RouterB(config-router)#network 195.14.125.0
RouterA(config-router)#no auto-summary

MULTIPROTOCOL NETWORK

Configuring OSPF (area 0, area 1, and area 2)

Configuration EIGRP
R1(config)# int Serial0/0/1 ip mode eigrp 110 md5
R2 interface Serial0/0/1 ip auth mode eigrp 110 md5

4

MULTIPROTOCOL NETWORK

5

R3 interface Serial0/0/1 ip auth mode eigrp 110 md5
R4 interface Serial0/0/1 ip auth mode eigrp 110 md5

Implementing a Secure Update of OSPF and EIGRP Protocol
Attackers will definitely try to gain access into the network through the router devices,
intercepting peering sessions as well as the using the routing information (Davis, 2014). This
kind of attack can be addressed by the use of protocols such as EIGRP, BGP, OSPF, and RIPv2
as they have configurations that help in securing of the routing infrastructure (Halsall, 2016). The
appropriate methods of this situation are:
i.

Neighbor authentication whereby the routing protocols is implemented in a way that
only the router receives will be fed with reliable and appropriate routing information that
comes from trusted neighbors. Such configurations are done through certification of the
authenticity that is applied the entire neighbor as well as integrity of its underlying
routing updates. Therefore, each router should be initially configured to have their shared
secret key which will be used in validation of any routing update occurring. For every
routing update that will be sent, each router within the network will have to sign it by use
of the predefined secret key.

MULTIPROTOCOL NETWORK

6

OSPF MD5 authentication

Authentication in EIGRP MD5 i...

flag Report DMCA
Review

Anonymous
Outstanding Job!!!!

Similar Questions
Hot Questions
Related Tags

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors