Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave

How can the network that you have implemented in part 2 of this Case study be optimized to improve performance. You report can analyse the following and justify the aspects that you consider are most appropriate:

  • Possible changes to the network design topology and configuration
  • Network devices from different vendors
  • New routing features protocols e.g. other routing protocols
  • New switching features e.g. VLANs, port security etc
  • Teamwork for problem solving is encouraged - you may work together with other students outside of class time to find solutions to problems, review sources of information and learn from each other.
  • The report must be your own original work so please write it in your own words.
  • DO NOT
    • Give a copy of your notes or assignment work to other students
    • Copy another students’ work or copy chunks of text from the internet or other sources into your assignment – this is what we call “plagiarism” and is treated as “serious misconduct” which can result in failing the paper.
    • Copy text from the internet and replace a few words or use word replacement software to rewrite it. It is obvious to tutors when you do this and is also treated as plagiarism
    • Think that your tutor won’t be able to tell if it is your work or not – we can
  • DO
    • Ensure that you keep backup copies of your work.  
    • Use correct APA referencing for all sources
    • Learn how to correctly paraphrase and reference sources of information (see Student Learning Services for help)
    • Use formal business English appropriate for an employer
    • Write everything in your own words and reference the source of information
    • Be prepared to verbally explain aspects of your submitted report to your tutor if asked.

Network design

Routing is the process by which the best route is chosen among many routes in order to transmit data between the source and the destination. The choice of routes depend on the routing protocols that are implemented in any given network. The routing protocols utilizes different metrics in order to select the best routes to transmit data. This paper describes how RIP with IPv6 address can be improved in any given network topology in order to increase the performance of any given network topology (Baran & Sosa 2017).

Improvement of any given network topology that is connected using RIPng protocols mainly targets the following features of the protocol that is implemented in the network. The database request time, the response time that the routing protocols offers, the security in the connection ports of the network.,IPv6 traffic jitter and the end to end delay and response to communication. The following shows how configuration in RIPng can be improved in the given network topology in order to improve the performance of the network.

Network design

Good network design and placing of network components in the required areas make routing very simple (Jayakumar, Rekha, & Bharathi, 2015,) .This property increases the speed in which devices communicate within the given network. In this case the following network design diagram is proposed.

Adding one router to the previous topology will improve the performance of the previous network. This because four routers have the following advantages in RIP routing. When four routers are used to in the network configuration will be very easy since the topology can be easily understood by the network engineers. Use of more routers promote load balancing in network. This means that many routes will be available for data to flow within the network since the existing routers installs routes with lower administrating level in the network.

VPN server 

Configuring VPN servers to enable users to connect to the entire network remotely. Implementation of VPN server will have the following advantages in the network. The network will have improved security, it increases online safety when accessing resources through the internet .It prevents a hackers from accessing the information this because the ISP’s that is in the network will not be able to access user log’s that are created in the network.

Use of VPN in any network allows remote access to information thus users will be able to access from any location   increasing productivity. VPN is also used to reduce the cost of accessing the internet in any given network. Lastly use of VPN service normally allows users to bypass restrictions in any given network. This means that the network users will be able to access information in any webserver while using the service without any restrictions.

Configuring RIPng Authentication

Use of RIPv2 in the network which supports RIP authentication of links before they are accessed or activated to be alive. Authentication provides an additional layer of network security beyond other security features that are included in the network (Wan, Kranakis, & Oorschot,  2014). This features allows routers to authenticate each other while communicating using the same keys that are configured in the network. This type of feature is not supported by RIPv1 of routing.

VPN server

Configuration of the link state protocols

This is feature of  RIPng that allows routers to learn to its directly connected network. In this feature the router is responsible for saying hello to the connected networks. The advantage of this feature of RIP is that each router builds its own topological map of the network in order to determine the shortest part to follow in the network (Xu & Trajkovic, 2011). The protocol also allows use of hierarchical design during implementation when implementing multiple areas. This can be as shown in the following diagram.

Network management tools

This are the software and hardware components that are used in network implementation in order for the network to perform efficiently as per the requirements. These are the tools that are used in order to detect earliest failures in any network and improve them at early stage(Rawat, Kumar & Gupta, 2014). The management tools that should be include in this network include server, security and databases tool. The following is an example of the tools that should be included in order to increase the performance of the network.

Firewalls

These are the systems that are used to prevent unauthorized access to or from private networks. It will be implemented both as a hardware or a software. In this case the firewalls can be implemented in each router in order to prevent unauthorized access the network (Verma & Bhardwaj, 2016).

Other tools that should be included in the network include backup server for data backup in case the main server fails. Implementation of the virtual server will also be very important in the network

Routing and switching feature comparison

There are different types of switches from different vendors that are required in the network implementation. This switches support different kind of features that are required in any network.

Switches

Among the switches that should be implemented in any network are the switches from cisco, Juniper network and Arista networks. An example of such network switch is the 16 slot cisco-nexus switch 9500 that houses a lot of gigaEthernet ports up to 576.This switches have a lot of ports and throughputs thus they are the best to be implemented in the network (Yi et al., 2014).

Routers

Routers are very essential in implementation of any network. There different types of routers that are from different types of vendors with different specified characters that should be installed in this network. The net gear switch from Cisco and Juniper networks should be implemented in this network dues to its high functionality and high number of ports that are present in it

Conclusion

Since RIPng runs over IPv6, RIPng relies on the IP Authentication Header and the IP Encapsulating Security Payload to ensure integrity and authentication/confidentiality of routing exchanges. Network firewalls are also recommended to be added in the network in order to increase the network security   and prevent attackers from accessing the network. The virtual server should also be included in the network in order to reduce the maintenance and increase the functionality of the network. More so virtual server centralized management of the data in the network thus making it easier for the network to be maintained.

This also supports backing up of data in case there is any data loss in the network. The selection of network components to be used in network is very much essential. They determine the speed of the network and its efficiency. The selected network components in any network should be highly related and from trusted vendors in order for the network to be efficient throughout. The VPN server is also implemented in the network in order to allow users to access the network privately from any location.

References

Baran, B., & Sosa, R. (2017). A new approach for AntNet routing. In Computer Communications

 and Networks, 2000. Proceedings. Ninth International Conference on (pp. 303-308).

 IEEE.

Jayakumar, M., Rekha, N. R. S., & Bharathi, B. (2015, March). A comparative study on RIP and

OSPF protocols. In Innovations in Information, Embedded and Communication Systems

(ICIIECS), 2015 International Conference on (pp. 1-5). IEEE.

Rawat, G. S., Kumar, D., & Gupta, S. C. (2014, October). An analysis of DYMO, FSR, ZRP and

RIP routing protocols using QUALNET. In Proceedings of the 2014 International

Conference on Interdisciplinary Advances in Applied Computing (p. 2). ACM.

Verma, A., & Bhardwaj, N. (2016). A review on routing information protocol (RIP) and open

shortest path first (OSPF) routing protocol. International Journal of Future Generation

 Communication and Networking, 9(4), 161-170.

Wan, T., Kranakis, E., & van Oorschot, P. C. (2014, June). S-rip: A secure distance vector

routing protocol. In International Conference on Applied Cryptography and Network

 Security(pp. 103-119). Springer, Berlin, Heidelberg.

Xu, D., & Trajkovic, L. (2011). Performance analysis of RIP, EIGRP, and OSPF using OPNET.

Yi, C., Abraham, J., Afanasyev, A., Wang, L., Zhang, B., & Zhang, L. (2014, September). On

the role of routing in named data networking. In Proceedings of the 1st ACM Conference

 on Information-Centric Networking (pp. 27-36). ACM.

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2021). Improving Network Performance With IPv6 And RIPng Essay.. Retrieved from https://myassignmenthelp.com/free-samples/comp712-routing-and-switching-essentials/network-topology.html.

"Improving Network Performance With IPv6 And RIPng Essay.." My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/comp712-routing-and-switching-essentials/network-topology.html.

My Assignment Help (2021) Improving Network Performance With IPv6 And RIPng Essay. [Online]. Available from: https://myassignmenthelp.com/free-samples/comp712-routing-and-switching-essentials/network-topology.html
[Accessed 05 December 2024].

My Assignment Help. 'Improving Network Performance With IPv6 And RIPng Essay.' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/comp712-routing-and-switching-essentials/network-topology.html> accessed 05 December 2024.

My Assignment Help. Improving Network Performance With IPv6 And RIPng Essay. [Internet]. My Assignment Help. 2021 [cited 05 December 2024]. Available from: https://myassignmenthelp.com/free-samples/comp712-routing-and-switching-essentials/network-topology.html.

Get instant help from 5000+ experts for
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing: Proofread your work by experts and improve grade at Lowest cost

loader
250 words
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Plagiarism checker
Verify originality of an essay
essay
Generate unique essays in a jiffy
Plagiarism checker
Cite sources with ease
support
close