WAN Architectures and Design Principles Adam Groudan – Technical Solutions Architect Agenda

Total Page:16

File Type:pdf, Size:1020Kb

WAN Architectures and Design Principles Adam Groudan – Technical Solutions Architect Agenda WAN Architectures and Design Principles Adam Groudan – Technical Solutions Architect Agenda . WAN Technologies & Solutions • WAN Transport Technologies • WAN Overlay Technologies • WAN Optimisation • Wide Area Network Quality of Service . WAN Architecture Design Considerations • WAN Design and Best Practices • Secure WAN Communication with GETVPN • Intelligent WAN Deployment . Summary The Challenge . Build a network that can adapt to a quickly changing business and technical environment . Realise rapid strategic advantage from new technologies • IPv6: global reachability • Cloud: flexible diversified resources • Internet of Things • Fast-IT • What’s next? . Adapt to business changes rapidly and smoothly • Mergers & divestures • Changes in the regulatory & security requirements • Changes in public perception of services Network Design Modularity East Theater West Theater Global IP/MPLS Core Tier 1 Tier In-Theater IP/MPLS Core Tier 2 Tier West Region East Region Internet Cloud Public Voice/Video Mobility Tier 3 Tier Metro Metro Service Private Service Public IP IP Service Service Hierarchical Network Principle . Use hierarchy to manage network scalability and complexity while reducing routing algorithm overhead . Hierarchical design used to be… • Three routed layers • Core, distribution, access • Only one hierarchical structure end-to-end . Hierarchical design has become any design that… • Splits the network up into “places,” or “regions” • Separates these “regions” by hiding information • Organises these “regions” around a network core • “hub and spoke” at a macro level MPLS L3VPN Topology Definition Spoke Site 1 Spoke Spoke Site 2 Site Y Hub Site (The Network) SP-Managed Equivalent to MPLS IP WAN Spoke Spoke Spoke Spoke Spoke Spoke Spoke Site 1 Site 2 Site X Site Y Site N Site X Site N . MPLS WAN is provided by a service provider . As seen by the enterprise network, every site is one IP “hop” away . Equivalent to a full mesh, or to a “hubless” hub-and-spoke Virtual Routing and Forwarding Instance (VRF) Provides Network Virtualisation and Path Isolation VRF VRF VRF VRF VRF VRF . Virtualisation at Layer 3 forwarding ! PE Router – Multiple VRFs ip vrf blue . Associates to Layer 3 interfaces on router/switch rd 65100:10 . Each VRF has its own route-target import 65100:10 route-target export 65100:10 Forwarding table (CEF) ip vrf yellow rd 65100:20 Routing process (RIP, OSPF, BGP) route-target import 65100:20 route-target export 65100:20 . VRF-Lite ! interface GigabitEthernet0/1.10 Hop-by-hop ip vrf forwarding blue . MPLS VPN interface GigabitEthernet0/1.20 ip vrf forwarding yellow Multi-hop Wide Area Network Design Trends Single Provider Design Dual Providers Design Overlay Network Design . Enterprise will home all sites . Enterprise will single or dual home . Overlay tunnelling technologies into a single carrier to sites into one or both carriers to with encryption for provider provide L3 MPLS VPN provide L3 MPLS VPN connectivity. transport agnostic design connectivity. Pro: Protects against MPLS service . Pro: Can use commodity . Pro: Simpler design with failure with Single Provider broadband services for lower consistent features cost higher bandwidth service . Pro: Potential business leverage for . Con: Bound to single carrier better competitive pricing . Pro: Flexible overlay network for feature velocity topology that couples from the . Con: Increased design complexity physical connectivity . Con: Does not protect due to service implementation against MPLS cloud failure differences (e.g. QoS, BGP AS . Con: Increased design with Single Provider Topology) complexity . Con: Feature differences between . Con: Additional technology providers could force customer to use needed for SLA over commodity least common denominator features. transport services Single Carrier Site Types (Non-Transit) . Dual Homed Non Transit AS 64517 Only advertise local prefixes (^$) CE3 CE4 Typically with Dual CE routers CE5 BGP design: eBGP to carrier AS 200 iBGP between CEs Redistribute cloud learned routes into site IGP CE1 CE2 . Single Homed Non Transit Site IGP C1 C2 Advertise local prefixes and AS 64512 optionally use default route. Dual Carrier: Transit vs. Non Transit . To guarantee single homed site reachability to a dual homed site experiencing a failure, transit CE3 CE4 sites had to be elected. CE5 . Transit sites would act as a BGP Transit AS 64545 bridge transiting routes between AS 100 AS 200 the two provider clouds. To minimise latency costs of transits, transits need to be CE1 CE2 Site selected with geographic IGP diversity (e.g. from the East, C1 C2 West and Central US.) Prefix X Prefix Y Prefix Z Metro Ethernet Service (L2VPN) E-Line (Point-to-Point) E-LAN (Point-to-Multipoint) . Replaces TDM private line . Offers point to multipoint for any-to- . Point-to-point EVCs offer predictable any connectivity performance for applications . Transparent to VLANs and Layer 2 . One or more EVCs allowed per control protocols single physical interface (UNI) . 4 or 6 classes of QoS support . Ideal for voice, video, and real-time . Ideal for LAN-to-LAN bulk data data MPLS (L3VPN) vs. Metro Ethernet (L2VPN) MPLS Layer 3 Service MetroE Layer 2 Service . Routing protocol dependent on the . Flexibility of routing protocol and carrier network topology independent of the carrier . Layer 3 capability depends on carrier offering . Customer manages layer 3 QoS • QoS (4 classes/6 classes) . Capable of transport IP and • IPv6 capability non-IP traffic. Transport IP protocol only . Routing protocol determines . Highly scalable and ideal for large scalability in point-to-multipoint network topology Agenda . WAN Technologies & Solutions • WAN Transport Technologies • WAN Overlay Technologies • WAN Optimisation • Wide Area Network Quality of Service . WAN Architecture Design Considerations • WAN Design and Best Practices • Secure WAN Communication with GETVPN • Intelligent WAN Deployment . Summary Types of Overlay Service Layer 2 Overlays Layer 3 Overlays • Layer 2 Tunnelling Protocol—Version 3 • IPSec—Encapsulating Security Payload (L2TPv3) (ESP) – Layer 2 payloads (Ethernet, Serial,…) – Strong encryption – Pseudowire capable – IP Unicast only • Other L2 overlay technologies – • Generic Routing Encapsulation (GRE) OTV, VxLAN – IP Unicast, Multicast, Broadcast – Multiprotocol support • Other L3 overlay technologies – MPLSomGRE, LISP, OTP Tunnelling GRE and IPSec Transport and Tunnel Modes IP HDR IP Payload GRE packet with new IP header: Protocol 47 (forwarded using new IP dst) IP HDR GRE IP HDR IP Payload 20 bytes 4 bytes IPSec Transport mode 2 bytes ESP ESP IP HDR ESP HDR IP Payload Trailer Auth 20 bytes 30 bytes Encrypted Authenticated IPSec Tunnel mode 2 bytes ESP ESP IP HDR ESP HDR IP HDR IP Payload Trailer Auth 20 bytes 54 bytes Encrypted Authenticated Locator/Identifier Separation Protocol (LISP) Dynamic Tunnelling Analogous to a DNS but for Network Infrastructure . DNS resolves IP addresses for URLs [ who is www.cisco.com] ? DNS DNS host Server URL Resolution [153.16.5.29, 2610:D0:110C:1::3 ] . LISP resolves locators for queried identities [ where is 2610:D0:110C:1::3] ? LISP LISP LISP Mapping Identity-to-location router [ location is 128.107.81.169 ] System Map Resolution This Topic Is Covered in Detail in BRKRST-3045 LISP Overview - Terminologies . EID (Endpoint Identifier) is the IP address of a host – just as it is today . RLOC (Routing Locator) is the IP address of the LISP router for the host . EID-to-RLOC mapping is the distributed architecture that maps EIDs to RLOCs ITR – Ingress Tunnel Router ETR – Egress Tunnel Router • Receives packets from site-facing interfaces • Receives packets from core-facing interfaces • Encap to remote LISP sites, or native-fwd to • De-cap, deliver packets to local EIDs at site non-LISP sites Provider A Provider X xTR-1 xTR-1 10.0.0.0/8 12.0.0.0/8 ETR ETR ITR ITR packet flow packet flow S ETR ETR ITR ITR D Provider Y xTR-2 Provider B xTR-2 11.0.0.0/8 13.0.0.0/8 LISP Site 1 LISP Site 2 LISP Operation Example LISP Data Plane - Unicast Packet Forwarding Map-Cache Entry 3 EID-prefix: 2001:db8:2::/48 Locator-set: This policy controlled 12.0.0.2, priority: 1, weight: 50 (D1) by the destination site 13.0.0.2, priority: 1, weight: 50 (D2) PI EID-prefix PI EID-prefix 2001:db8:1::/48 6 2001:db8:2::/48 11.0.0.2 -> 12.0.0.2 7 LISP Site 1 2001:db8:1::1 -> 2001:db8:2::1 LISP Site 2 2001:db8:1::1 -> 2001:db8:2::1 Provider A Provider X xTR-1 xTR-1 2 2001:db8:1::1 -> 2001:db8:2::1 10.0.0.0/8 12.0.0.0/8 ETR 5 ETR ITR 10.0.0.2 4 12.0.0.2 ITR 11.0.0.2 -> 12.0.0.2 2001:db8:1::1 -> 2001:db8:2::1 ETR ETR S 11.0.0.2 13.0.0.2 ITR ITR D Provider Y xTR-2 Provider B xTR-2 11.0.0.0/8 13.0.0.0/8 1 DNS entry: D.abc.com AAAA 2001:db8:2::1 LISP Use Cases IPv6 Transition Efficient Multi-Homing v6 PxTR v4 v6 IPv4 Core IPv6 Internet Internet v6 service xTR IPv4 Internet LISP LISP v6 Site routers . IPv6-over-IPv4, IPv6-over-IPv6 . IP Portability . IPv4-over-IPv6, IPv4-over-IPv4 . Ingress Traffic Engineering Without BGP Virtualisation/Multi-tenancy Data Centre/ VM Mobility Legacy Site Legacy Site Legacy Site Data Internet Data Centre 1 Centre 2 LISP Site PxTR LISP LISP Mapping routers routers IP Network DB VM move VM VM West East a.b.c.1 DC DC a.b.c.1 . Large Scale Segmentation . Cloud / Layer 3 VM Move EIGRP Over-the-Top (OTP) Overview EIGRP OTP extend end-to-end network visibility over WAN EIGRP RR CE1 172.16.2.1 172.16.1.1 CE3 EIGRP MPLS – L3 VPN EIGRP AS 100 AS 100 192.168.2.1 192.168.1.1 CE2 CE4 LISP Encapsulation EIGRP Control Plane LISP data plane
Recommended publications
  • Safe Routing Reconfigurations with Route Redistribution
    Safe Routing Reconfigurations with Route Redistribution Stefano Vissicchio∗, Laurent Vanbevery, Luca Cittadiniz, Geoffrey G. Xiex, Olivier Bonaventure∗ ∗Universite´ catholique de Louvain, yPrinceton University, zRomaTre University, xNaval Postgraduate School Abstract—Simultaneously providing flexibility, evolvability operators can combine the advantages of different routing and correctness of routing is one of the basic and still unsolved protocols (or different configuration modes), e.g., optimizing problems in networking. Route redistribution provides a tool, one RD for scalability and another for fine-grained traffic used in many enterprise networks, to either partition a network engineering. into multiple routing domains or merge previously independent networks. However, no general technique exists for changing a live The division of an enterprise network in routing domains network’s route redistribution configuration without incurring is not static. Various events can force an enterprise network packet losses and service disruptions. operator to change the boundaries of its routing domains. In this paper, we study the problem of how to safely transition Splitting and merging networks, e.g., to accommodate mergers between route redistribution configurations. We investigate what and acquisitions, are two radical examples. Simply replacing anomalies may occur in the reconfiguration process, showing a router by another router from a different brand may also that many long-lasting forwarding loops can and do occur if force a boundary modification. Finally, the events can be naive techniques are applied. We devise new sufficient conditions driven by short-term objectives such as a change to the traffic for anomaly-free reconfigurations, and we leverage them to engineering requirements or router maintenance, as well as build provably safe and practical reconfiguration procedures.
    [Show full text]
  • Modeling Complexity of Enterprise Routing Design
    Modeling Complexity of Enterprise Routing Design Xin Sun Sanjay G. Rao Geoffrey G. Xie School of Computing and School of Electrical and Department of Computer Information Sciences Computer Engineering Science Florida International University Purdue University Naval Postgraduate School xinsun@cs.fiu.edu [email protected] [email protected] ABSTRACT to choose from [23]. Often, multiple designs exist to meet the same operational objectives, and some are significantly Enterprise networks often have complex routing designs given easier to implement and manage than others for a target net- the need to meet a wide set of resiliency, security and rout- work. For example in some cases, route redistribution may ing policies. In this paper, we take the position that minimiz- be a simpler alternative to BGP for connecting multiple rout- ing design complexity must be an explicit objective of rout- ing domains [16]. Lacking an analytical model to guide the ing design. We take a first step to this end by presenting a operators, the current routing design process is mostly ad systematic approach for modeling and reasoning about com- hoc, prone to creating designs more complex than necessary. plexity in enterprise routing design. We make three contri- butions. First, we present a framework for precisely defining In this paper, we seek to quantitatively model the com- objectives of routing design, and for reasoning about how a plexity associated with a routing design, with a view to de- combination of routing design primitives (e.g. routing in- veloping alternate routing designs that are less complex but stances, static routes, and route filters etc.) will meet the ob- meet the same set of operational objectives.
    [Show full text]
  • Shedding Light on the Glue Logic of the Internet Routing Architecture
    Shedding Light on the Glue Logic of the Internet Routing Architecture Franck Le†, Geoffrey G. Xie‡,DanPei∗,JiaWang∗ and Hui Zhang† †Carnegie Mellon University, ‡Naval Postgraduate School, ∗AT&T Labs - Research ABSTRACT A BD Recent studies reveal that the routing structures of operational net- works are much more complex than a simple BGP/IGP hierarchy, Routing domain 1 (OSPF) Routing domain 2 highlighted by the presence of many distinct instances of routing CE(EIGRP 20) protocols. However, the glue (how routing protocol instances inter- act and exchange routes among themselves) is still little understood Routing domain 3 F or studied. For example, although Route Redistribution (RR), the (RIP) implementation of the glue in router software, has been used in the Internet for more than a decade, it was only recently shown G H that RR is extremely vulnerable to anomalies similar to the perma- nent route oscillations in BGP. This paper takes an important step toward understanding how RR is used and how fundamental the Figure 1: An example enterprise network. role RR plays in practice. We developed a complete model and associated tools for characterizing interconnections between rout- ing instances based on analysis of router configuration data. We are often linked together not by BGP. Instead, routes are exchanged analyzed and characterized the RR usage in more than 1600 opera- between different routing domains via route redistribution options tional networks. The findings are: (i) RR is indeed widely used; (ii) configured on individual border routers connecting these domains. operators use RR to achieve important design objectives not realiz- Figure 1 illustrates such a design.
    [Show full text]
  • Understanding Route Redistribution
    Understanding Route Redistribution Franck Le Geoffrey G. Xie Hui Zhang Carnegie Mellon University Naval Postgraduate School Carnegie Mellon University [email protected] [email protected] [email protected] Abstract—Route redistribution (RR) has become an integral option local to a router. It designates the dissemination of part of IP network design as the result of a growing need routing information from one protocol process to another for disseminating certain routes across routing protocol bound- within the same router. For routers in the RIP instance to learn aries. While RR is widely used and resembles BGP in several nontrivial aspects, surprisingly, the safety of RR has not been the prefixes in the OSPF instance, a router (e.g., D or E) needs systematically studied by the networking community. This paper to run both a process of RIP and a process of OSPF and inject presents the first analytical model for understanding the effect the OSPF routes into the RIP instance. of RR on network wide routing dynamics and evaluating the As such, router vendors introduced RR to address a need safety of a specific RR configuration. We first illustrate how from network operations. We recently looked at the configura- easily inaccurate configurations of RR may cause severe routing instabilities, including route oscillations and persistent routing tions of some large university campus networks and found that loops. At the same time, general observations regarding the root RR is indeed widely used. However, contrary to traditional causes of these instabilities are provided. We then introduce a routing protocols, there is no standard or RFC formally formal model based on the general observations to represent defining the functionality of RR.
    [Show full text]
  • IWAN) Direct Internet Access (DIA
    CISCO VALIDATED DESIGN IWAN Direct Internet Access Design Guide December 2016 REFERENCE NETWORK ARCHITECTURE Table of Contents Table of Contents Introduction ..................................................................................................................................... 1 Related Reading ...............................................................................................................................................................1 Technology Use Cases .....................................................................................................................................................1 Overview of Cisco IWAN and Secure DIA .......................................................................................................................4 Direct Internet Access Design ........................................................................................................ 10 Design Detail ................................................................................................................................................................. 10 Deploying Direct Internet Access ................................................................................................... 28 Using This Section ........................................................................................................................................................ 28 IWAN Single-Router Hybrid Remote Site with DIA .......................................................................................................
    [Show full text]
  • Border Gateway Protocol, Route Manipulation, and IP Multicast
    C H A P T E R12 Border Gateway Protocol, Route Manipulation, and IP Multicast This chapter covers the Border Gateway Protocol (BGP), which is used to exchange routes between autonomous systems. It is most frequently used between enterprises and service providers. The “Route Manipulation” section covers route summarization and redistribution of route information between routing protocols. The CCDA should know where redistribution occurs when required by the network design. This chapter also reviews policy-based routing (PBR) as a method to change the destination IP address based on policies. Finally, this chapter covers IP multicast protocols. “Do I Know This Already?” Quiz The purpose of the “Do I Know This Already?” quiz is to help you decide whether you need to read the entire chapter. If you intend to read the entire chapter, you do not necessarily need to answer these questions now. The eight-question quiz, derived from the major sections in the “Foundation Topics” portion of the chapter, helps you determine how to spend your limited study time. Table 12-1 outlines the major topics discussed in this chapter and the “Do I Know This Already?” quiz questions that correspond to those topics. Table 12-1 “Do I Know This Already?” Foundation Topics Section-to-Question Mapping Foundation Topics Section Questions Covered in This Section BGP 1, 2, 7, 8 Route Manipulation 3, 4 IP Multicast Review 5, 6 CAUTION The goal of self-assessment is to gauge your mastery of the topics in this chapter. If you do not know the answer to a question or you are only partially sure, you should mark this question wrong for the purposes of the self-assessment.
    [Show full text]
  • IP Routing: Protocol-Independent Configuration Guide, Cisco IOS XE Release 3E
    IP Routing: Protocol-Independent Configuration Guide, Cisco IOS XE Release 3E Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • Chapter 11: IGP Route Redistribution, Route Summarization, and Default Routing
    Blueprint topics covered in this chapter: This chapter covers the following topics from the Cisco CCIE Routing and Switching written exam blueprint: ■ IP Routing — OSPF — EIGRP — Route Filtering — RIPv2 — The use of show and debug commands C H A P T E R 11 IGP Route Redistribution, Route Summarization, and Default Routing This chapter covers several topics related to the use of multiple IGP routing protocols. IGPs can use default routes to pull packets toward a small set of routers, with those routers having learned routes from some external source. IGPs can use route summarization with a single routing protocol, but it is often used at redistribution points between IGPs as well. Finally, route redistribution by definition involves moving routes from one routing source to another. This chapter takes a look at each topic. “Do I Know This Already?” Quiz Table 11-1 outlines the major headings in this chapter and the corresponding “Do I Know This Already?” quiz questions. Table 11-1 “Do I Know This Already?” Foundation Topics Section-to-Question Mapping Foundation Topics Section Questions Covered in This Section Score Route Maps, Prefix Lists, and Administrative 1–2 Distance Route Redistribution 3–6 Route Summarization 7–8 Default Routes 9 Total Score In order to best use this pre-chapter assessment, remember to score yourself strictly. You can find the answers in Appendix A, “Answers to the ‘Do I Know This Already?’ Quizzes.” 314 Chapter 11: IGP Route Redistribution, Route Summarization, and Default Routing 1. A route map has several clauses. A route map’s first clause has a permit action configured.
    [Show full text]
  • Route Redistribution V1.14 – Aaron Balchunas 1
    Route Redistribution v1.14 – Aaron Balchunas 1 - Route Redistribution - Route Redistribution Basics It is preferable to employ a single routing protocol in an internetwork environment, for simplicity and ease of management. Unfortunately, this is not always possible, making multi-protocol environments common. Route Redistribution allows routes from one routing protocol to be advertised into another routing protocol. The routing protocol receiving these redistributed routes usually marks the routes as external. External routes are usually less preferred than locally-originated routes. At least one redistribution point needs to exist between the two routing domains. This device will actually run both routing protocols. Thus, to perform redistribution in the following example, RouterB would require at least one interface in both the EIGRP and the OSPF routing domains: It is possible to redistribute from one routing protocol to the same routing protocol, such as between two separate OSPF domains (distinguished by unique process ID’s ). Static routes and connected interfaces can be redistributed into a routing protocol as well. Routes will only be redistributed if they exist in the routing table. Routes that are simply in a topology database (for example, an EIGRP Feasible Successor), will never be redistributed. Routing metrics are a key consideration when performing route redistribution. With the exception of IGRP and EIGRP, each routing protocol utilizes a unique (and thus incompatible) metric. Routes redistributed from the injecting protocol must be manually (or globally) stamped with a metric that is understood by the receiving protocol. (Reference: http://www.cisco.com/warp/public/105/redist.html ) * * * All original material copyright © 2007 by Aaron Balchunas ( [email protected] ), unless otherwise noted.
    [Show full text]
  • Performance Analysis of Route Redistribution Among Diverse Dynamic Routing Protocols Based on OPNET Simulation
    (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 8, No. 3, 2017 Performance Analysis of Route Redistribution among Diverse Dynamic Routing Protocols based on OPNET Simulation Zeyad Mohammad1 Adnan A. Hnaif3 Faculty of Science and Information Technology Faculty of Science and Information Technology Al Zaytoonah University of Jordan Al Zaytoonah University of Jordan Amman, 11733 Jordan Amman, 11733 Jordan Ahmad Abusukhon2 Issa S. Al-Otoum4 Faculty of Science and Information Technology Faculty of Science and Information Technology Al Zaytoonah University of Jordan Al Zaytoonah University of Jordan Amman, 11733 Jordan Amman, 11733 Jordan Abstract—Routing protocols are the fundamental block of information among autonomous system (AS) on the Internet. It selecting the optimal path from a source node to a destination is considered a distance vector routing protocol. An Interior node in internetwork. Due to emerge the large networks in Gateway Protocol is used to exchange routing information business aspect thus; they operate diverse routing protocols in between gateways within an AS. It consists of distance vector their infrastructure. In order to keep a large network connected; and link state routing protocols. A distance vector algorithm the implementation of the route redistribution is needed in builds a vector that contains costs to all other nodes and network routers. This paper creates the four scenarios on the distributes a vector to its neighbors. A link state algorithm in same network topology by using Optimized Network Engineering which each node finds out the state of the link to its neighbors Tools Modeler (OPNET 14.5) simulator in order to analyze the and the cost of each link.
    [Show full text]
  • A Comparative Performance Analysis of Route Redistribution Among Three Different Routing Protocols Based on Opnet Simulation
    International Journal of Computer Networks & Communications (IJCNC) Vol.9, No.2, March 2017 A COMPARATIVE PERFORMANCE ANALYSIS OF ROUTE REDISTRIBUTION AMONG THREE DIFFERENT ROUTING PROTOCOLS BASED ON OPNET SIMULATION Zeyad Mohammad 1, Ahmad Abusukhon 2 and Marzooq A. Al-Maitah 3 1,3 Department of Computer Network, Al-Zaytoonah University of Jordan, Amman, Jordan 2Department of Computer Science, Al-Zaytoonah University of Jordan, Amman, Jordan ABSTRACT In an enterprise network, it is normal to use multiple dynamic routing protocols for forwarding packets. Therefore, the route redistribution is an important issue in an enterprise network that has been configured by multiple different routing protocols in its routers. In this study, we analyse the performance of the combination of three routing protocols in each scenario and make a comparison among our scenarios. We have used the OPNET 17.5 simulator to create the three scenarios in this paper by selecting three different routing protocols from the distance vector and link state routing protocols in each scenario. In the first scenario, the network routers are configured from EIGRP, IGRP, and IS-IS that is named EIGRP_IGRP_ISIS in our simulation. The OSPF_IGRP_ISIS scenario is a mixed from EIGRP, IGRP, and IS-IS protocols that is the second scenario. The third scenario is OSPF_IGRP_EIGRP that is the route redistribution among OSPF, IGRP, and IS-IS protocols. The simulation results showed that the performance of the EIGRP_IGRP_ISIS scenario is better than the other scenarios in terms of network convergence time, throughput, video packet delay variation, and FTP download response time. In contrast, the OSPF_IGRP_ISIS has less voice packet delay variation, video conferencing and voice packet end to end delays, and queuing delay as compared with the two other scenarios.
    [Show full text]
  • A Project Report on REDISTRIBUTION of ROUTING PROTOCOLS with FRAME RELAY, VOIP & INTER-VLAN ROUTING SUBMITTED to RAJIV GANDHI PROUDYOGIKI VISHWAVIDYALAYA (M.P)
    A Project Report On REDISTRIBUTION OF ROUTING PROTOCOLS WITH FRAME RELAY, VOIP & INTER-VLAN ROUTING SUBMITTED TO RAJIV GANDHI PROUDYOGIKI VISHWAVIDYALAYA (M.P) in the partial fulfillment for the award of the degree of Bachelor of Engineering In Computer Science & Engineering SUBMITTED BY Pulkit Vohra Shivangi Garg Sourabh Mishra (0905cs0910 ) (0905cs091111) (0905cs091118) Under the guidance of Prof. Rajendra Kushwah (Head of the Dept. of Computer Science & Engineering) DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING INSTITUTE OF TECHONOLOGY & MANAGAMENT , GWALIOR-474001 CANDIDATE’S DECLARATION I hereby declare that the work which is being presented in this project report entitled, “Redistribution of Protocols with Inter-vlan Routing” in partial fulfilment of requirements for the award of the degree of BACHELOR OF ENGINEERING in COMPUTER SCIENCE & ENGINEERING ,submitted in the Department of Computer Science & Engineering, ITM Universe ,Gwalior, is an authentic record of my own work carried out under the guidance of Prof. Rajendra Kushwah, HOD, Department of Computer Science & Engineering, ITM Universe, Gwalior, during March-April, 2013. The matter embodied in this report has not been submitted by me for the award of any other degree or diploma. Dated: April 26th , 2013 PULKIT VOHRA SHIVANGI GARG SOURABH MISHRA CERTIFICATE This is to certify that the above statement made by the candidate is correct to the best of my knowledge. Prof. Rajendra Kushwah Head of the Department Department of Computer Science & Engineering Institute of Technology & Management, opp. Sitholi Station , Gwalior- 474001 ACKNOWLEDGEMENT I wish to express my deep sense of gratitude to and sincere thanks to my guide, Prof. Rajendra Kushwah ,HOD, Department of Computer Science & Engineering, Institute of Technology & Management, for his intuitive and careful guidance and constant encouragement throughout the course of my seminar work.
    [Show full text]