Font Size: a A A

Network Flow Optimization By Package Balance And Authentication

Posted on:2020-04-11Degree:MasterType:Thesis
Country:ChinaCandidate:Usman AnwarFull Text:PDF
GTID:2428330578468883Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In this era,every field requires high availability,of network with the least probability of data loss.Therefore,redundancy should be involved as much as possible for network design.However,the high availability of network necessitates higher managerial and operational cost.Redundancy protocols substantially help to solve the problem.First Hop Redundancy Protocols(FHRPs)are implemented to overcome traffic loss from source to destination in network communications.The first hop redundancy protocols include three protocols Hot Standby Router Protocol(HSRP),Virtual Router Redundancy Protocol(VRRP)and Gateway Load Balancing Protocol(GLBP).Each protocol has its own purpose and has its own advantages and disadvantages.FHRP was developed to reduce traffic loss.These protocols assist specific association to successfully transmit the traffic from source to goal without loss of numerous packet.In the event of the failure of one system,there is a backup mechanism which in an automatic manner actuates itself and keeps sending the traffic.The HSRP protocol and GLBP protocol are Cisco propriety whereas the VRRP protocol is the Institute of Electrical and Electronics Engineers(IEEE)standard.The paper include the comprehansive data of the protocols,their working and comparison between them.The comparison indicates that which protocol is best in which scenario and which is best among the three protocols.These protocols work on layer 3 devices that are on the Transport layer.The protocols are capable of transferring the traffic if one of the routers of the network trun off because of some technical issue.The FHRP includes different kind of protocols but contains three main protocols that are HSRP,VRRP and GLBP.Here we present a viable change to the aforementioned issue through MD5 algorithm based validation.Brief prologue to the MD-5,simulation of the networks by including MD-5 authentication utilizing different routing protocols like FHRP.GNS3 is being utilized to mimic the situations.Analysis of the MD-5 authentication is finished.The main point is to have a more encrypted information exchange without influencing the effectiveness of the network.
Keywords/Search Tags:Virtual Router Redundancy Protocol(VRRP), Hot Standby Router Protocol(HSRP), and Gateway Load Balancing Protocol(GLBP), MD5
PDF Full Text Request
Related items