SlideShare a Scribd company logo
1 of 6
Download to read offline
Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol.3, No.6, 2013
17
Protocol Data Unit (PDU): A Simulation
MaryAnne B. Taquiqui, PhD
College of Computer Science, AMA International University – Bahrain
Kingdom of Bahrain
anne1012ph@gmail.com , mbtaquiqui@amaiu.edu.bh
Abstract
The use of routing protocols plays an essential and major role on the performance of a network. These protocols
vary in terms of its application, features and configuration and management. Each routing protocol exhibits some
characteristics which may be the same or may differ with other protocols.
While there are protocols categorized as distance-vector and link state protocols, this study investigates Routing
Information Protocol specifically, version 2 (RIPv2), and Enhanced Interior Gateway Routing Protocol. The
purpose of which, is to compare these two protocols on the basis a Protocol Data Unit that is sent from a specific
source to a destination. The performance activity of a packet as it moves toward the destination is simulated and
as a result will show which packet will arrive first under certain circumstances.
Keywords: Protocol Data Unit (PDU), Routing Information Protocol (RIP), Enhanced Interior Gateway Routing
Protocol (EIGRP), Variable Length Subnet Mask (VSLM), Classless, Packet
Introduction
In a packet-switched network, routing protocols play a significant role on how protocol data unit travel through
the network. The utilization of these protocols, among other factors, governs the behavior of packets from the
source up to the destination.
Routing protocols, such as Routing Information Protocol and Enhanced Interior Gateway Routing Protocol are
some of the used protocols today. These dynamic routing protocols are used to find networks and update routing
tables on routers.
In this study, RIP version 2 and EIGRP were used in the configuration of the routers. RIPv2 is a distance-vector
routing protocol, hence, uses hop count in the determination of the best path to a remote network. EIGRP, on the
other hand, is an enhanced distance-vector protocol which uses the idea of autonomous system in describing the
set of adjacent routers running the same routing protocol and share routing information. Both protocols support
Variable Length Subnet Mask (VLSM) networks.
For purposes of determining the time it takes for a packet to reach the destination, from a specified source to a
specified destination, a given network scenario was presented, having the same classless addressing scheme but
with the application of the two different routing protocols as mentioned.
This research aimed to examine the performance of a network in terms of the time it takes a packet to arrive at
the destination, passing through several intermediary devices.
Related Studies
In a study conducted by Xu, et.al (2011), “routing protocols are key elements of modern communication
networks. Currently deployed dynamic routing protocols that are used to propagate network topology
information to the neighboring routers are Routing Information Protocol (RIP), Enhanced Interior Gateway
Routing Protocol (EIGRP), and the Open Shortest Path First (OSPF) protocol. The choice of the right routing
protocol depends on a number of parameters. In their paper, they used OPNET Modeler to analyze the
performance of RIP, EIGRP, and the OSPF protocols, which are commonly deployed in Internet Protocol (IP)
networks. They designed various simulation scenarios to compare their performance in terms of network
convergence, routing traffic, ethernet delay, email upload response time, video-conferencing packet end-to-end
delay, and voice packet delay. Simulation results indicate that RIP performs better in terms of voice packet delay
Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol.3, No.6, 2013
18
because it is a simple routing protocol that relies on distance vector algorithms. RIP generates less protocol
traffic compared to EIGRP and OSPF, especially in medium size networks simulated in this project. RIP’s
weakness is slower convergence time in larger networks. This weakness may cause inconsistent routing entries
and occasionally results in routing loops or metrics approaching infinity. RIP is preferred in networks smaller
than 15 hops. EIGRP performs better in terms of network convergence, routing traffic, and Ethernet delay.
EIGRP has the characteristics of both distance vector and link state protocols, has improved network
convergence, reduced routing protocol traffic, and less CPU and RAM utilization compared to RIP and the
OSPF protocol”.
In another study conducted by Ayub, et.al (2011), “the main goal behind their investigation was to provide
understanding of Interior Gateway Protocols (OSPF and EIGRP) regarding best possible efficiency, and to
provide a guideline for optimal use while choosing routing protocols to obtain faster convergence and improved
performance. Different routing protocols were defined on the basis of their comparative performance regarding
to the convergence and link state advertisements (LSAs). Various scenarios have been considered and these were
analyzed with simulation tool OPNET. Among the various findings of their study: the most important regarding
convergence issues are the better performance of EIGRP as compared to OSPF. EIGRP found much better on
basis of its good CPU utilization, less time consumption, better convergence performance and ease in
management.”
Methodology
The study made use of theoretical presentation of RIPv2 and EIGRP along their features and implementation.
Further, an experimental method through the Packet Tracer Simulation Tool was utilized in determining the time
it takes a PDU to reach a specific destination. The data was analyzed by averaging the time the PDU passed
through one device to another towards the remote network.
Results
The network scenario comprised of three subnets, each of which had been assigned of an IP address which was
subnetted in a classless method. The experiment consisted of 3 Cisco routers and switches. The end devices (PC)
are a representation of the actual number of hosts. For purposes of showing that hosts are connected, 2 hosts per
subnet were used. Table 1 shows the hardware used; Table 2 shows the addressing scheme; Figure1 shows the
Time Difference between RIPv2 and EIGRP; and Figure 2 shows the network topology used for the simulation.
With a given network topology, having the same IP addresses, but configured with two different protocols, it can
be seen from the results that one protocol exceeds the other in terms of the time it takes a packet to reach the
destination.
In the scenario presented, a PDU was sent from a specific host in one subnet to a host in another subnet. And
with 10 instances using the Packet Tracer simulator, the average time it took for RIPv2 packet is faster than the
EIGRP network.
Conclusion
Based on the presentation of data and the results generated, it can be deduced that, for a similar network scenario
and circumstances and using the simulator, the use of the RIPv2 protocol in a network leads to a packet reaching
the destination faster than EIGRP. This can be anchored on the experimentation done.
References
Ayub, N., et al. (2011). Performance Analysis of OSPF and EIGRP Routing Protocols with Respect to the
Convergence, European Journal of Scientific Research, ISSN 1450-216X Vol. 61 No. 3, pp434-447.
Farhangi, S. et al. (2012). Performance Comparison of Mixed Protocols Based on EIGRP, IS-IS and OSPF for
Real Time Applications, Middle-East Journal of Scientific Research 12 (11): 1502-1508, 2012 ISSN 1990-9233
Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol.3, No.6, 2013
19
Islam, M., et al. (2010). Simulation Based EIGRP over OSPF Performance Analysis, Blekinge Institute of
Technology,http://www.bth.se/com/mscee.nsf/attachments/4983_Thesis_Report_pdf/$file/4983_Thesis_Report.p
df.
Lammle, Todd. (2011). Cisco Certified Network Associate Study Guide , Wiley Publishing, Inc., Seventh
Edition.
McQuerry, Steve. (2008). Interconnecting Cisco Network Devices, Part 2 (ICND2), Cisco Systems Inc., Cisco
Press.
Thorenoor, S. (2010). Dynamic Routing Protocol Implementation Decision between EIGRP, OSPF and RIP
based on Technical Background Using OPNET Modeler, Proceedings of the 2010 Second International
Conference on Computer and Network Technology, IEEE Computer Society.
Wu, B. (2011). Simulation Based Performance Analyses on RIPv2, EIGRP , and OSPF Using OPNET, Math
and Computer Science Working Paper, Fayettville State University,
http://digitalcommons.uncfsu.edu/cgi/viewcontent.cgi?article=1011&context=macsc_wp.
Xu, D., et al., (2011). Performance Analysis of RIP, EIGRP, and OSPF using OPNET,
http://www2.ensc.sfu.ca/people/faculty/ljilja/cnl/presentations/xu/OW2011_presentation_donx_final.pdf.
Mary Anne B. Taquiqui, Ph.D, Coordinator, Continuous Quality Improvement and Faculty Member, College
of Computer Studies, AMA International University – Bahrain; Cisco Curriculum Lead/Cisco Instructor-
AMAIUB; Cisco Certified Entry Networking Technician; Member, IEEE.
Email: mbtaquiqui@amaiu.edu.bh , anne1012ph@gmail.com
Notes
Table 1. Hardware Used
Device Name Model
Router 0, Router 1, Router 2 Cisco 1841
Switch 0, Switch 1, Switch 2 Cisco 2960
Table 1 shows the devices which are used in the network topology. PC0, PC1 and PC5 are representation of the
actual hosts which can be used (refer to Table 2). Serial DCE is used for the link and Straight-through cables are
used for the interconnection between switch to PC and switch to router.
Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol.3, No.6, 2013
20
Table 2. Addressing Scheme
Subnet
Name
Needed
Size
Allocated
Size
Network Address Host Address
Broadcast
Address
Subnet Mask
A 30 30 192.168.1.0/27
192.168.1.1 -
192.168.1.30
192.168.1.31 255.255.255.224
B 10 14 192.168.1.32/28
192.168.1.33 -
192.168.1.46
192.168.1.47 255.255.255.240
C 3 6 192.168.1.48/29
192.168.1.49 -
192.168.1.54
192.168.1.55 255.255.255.248
D 2 2 192.168.1.56/30
192.168.1.57 -
192.168.1.58
192.168.1.59 255.255.255.252
E 2 2 192.168.1.60/30
192.168.1.61 -
192.168.1.62
192.168.1.63 255.255.255.252
Table 2 shows the addressing scheme for the network. The Major Network is 192.168.1.0/24; Available IP
addresses in major network: 254; Number of IP addresses needed: 47; Available IP addresses in allocated
subnets: 54; About 25% of available major network address space is used; About 87% of subnetted network
address space is used.
Figure1. Time Difference between RIPv2 and EIGRP
Figure 1 shows the graph of the 10 instances with which the PDU was sent from source to destination. Values
are presented in seconds. On the average, RIPv2 packet reached faster than EIGRP packet.
Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol.3, No.6, 2013
21
Figure 2. Network Scenario
Figure 2 shows the network scenario used for both protocols.
This academic article was published by The International Institute for Science,
Technology and Education (IISTE). The IISTE is a pioneer in the Open Access
Publishing service based in the U.S. and Europe. The aim of the institute is
Accelerating Global Knowledge Sharing.
More information about the publisher can be found in the IISTE’s homepage:
http://www.iiste.org
CALL FOR JOURNAL PAPERS
The IISTE is currently hosting more than 30 peer-reviewed academic journals and
collaborating with academic institutions around the world. There’s no deadline for
submission. Prospective authors of IISTE journals can find the submission
instruction on the following page: http://www.iiste.org/journals/ The IISTE
editorial team promises to the review and publish all the qualified submissions in a
fast manner. All the journals articles are available online to the readers all over the
world without financial, legal, or technical barriers other than those inseparable from
gaining access to the internet itself. Printed version of the journals is also available
upon request of readers and authors.
MORE RESOURCES
Book publication information: http://www.iiste.org/book/
Recent conferences: http://www.iiste.org/conference/
IISTE Knowledge Sharing Partners
EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open
Archives Harvester, Bielefeld Academic Search Engine, Elektronische
Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial
Library , NewJour, Google Scholar

More Related Content

What's hot

PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...Saurabh Mishra
 
Review on design of advanced opportunistics routing in manet
Review on design of advanced opportunistics routing in manetReview on design of advanced opportunistics routing in manet
Review on design of advanced opportunistics routing in manetyatin1988
 
On the routing overhead in infrastructureless multihop wireless networks
On the routing overhead in infrastructureless multihop wireless networksOn the routing overhead in infrastructureless multihop wireless networks
On the routing overhead in infrastructureless multihop wireless networksNarendra Singh Yadav
 
Providing A Network Encryption Approach to reduce end-to-end Delay in MANET
Providing A Network Encryption Approach to reduce end-to-end Delay in MANETProviding A Network Encryption Approach to reduce end-to-end Delay in MANET
Providing A Network Encryption Approach to reduce end-to-end Delay in MANETEditor IJCATR
 
Routing performance of structured overlay in Distributed Hash Tables (DHT) fo...
Routing performance of structured overlay in Distributed Hash Tables (DHT) fo...Routing performance of structured overlay in Distributed Hash Tables (DHT) fo...
Routing performance of structured overlay in Distributed Hash Tables (DHT) fo...journalBEEI
 
A novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manetA novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manetijcsa
 
Efficient Destination Discovery using Geographical Gossiping in MANETs
Efficient Destination Discovery using Geographical Gossiping in MANETsEfficient Destination Discovery using Geographical Gossiping in MANETs
Efficient Destination Discovery using Geographical Gossiping in MANETsidescitation
 
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACESDATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACEScscpconf
 
Shortcut Path Tress for Zigbee based Wireless Network
Shortcut Path Tress for Zigbee based Wireless NetworkShortcut Path Tress for Zigbee based Wireless Network
Shortcut Path Tress for Zigbee based Wireless NetworkIJERA Editor
 
A novel approach for preventing black hole
A novel approach for preventing black holeA novel approach for preventing black hole
A novel approach for preventing black holeijasa
 
Securing Data Communication for Node Anonymization Using Location Information
Securing Data Communication for Node Anonymization Using  Location InformationSecuring Data Communication for Node Anonymization Using  Location Information
Securing Data Communication for Node Anonymization Using Location InformationIJMER
 
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3ijwmn
 
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...ijwmn
 

What's hot (20)

I41026670
I41026670I41026670
I41026670
 
32 marycherian 336-349
32 marycherian 336-34932 marycherian 336-349
32 marycherian 336-349
 
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
 
Review on design of advanced opportunistics routing in manet
Review on design of advanced opportunistics routing in manetReview on design of advanced opportunistics routing in manet
Review on design of advanced opportunistics routing in manet
 
Fo35991995
Fo35991995Fo35991995
Fo35991995
 
011001010 a
011001010 a011001010 a
011001010 a
 
On the routing overhead in infrastructureless multihop wireless networks
On the routing overhead in infrastructureless multihop wireless networksOn the routing overhead in infrastructureless multihop wireless networks
On the routing overhead in infrastructureless multihop wireless networks
 
Providing A Network Encryption Approach to reduce end-to-end Delay in MANET
Providing A Network Encryption Approach to reduce end-to-end Delay in MANETProviding A Network Encryption Approach to reduce end-to-end Delay in MANET
Providing A Network Encryption Approach to reduce end-to-end Delay in MANET
 
G1063841
G1063841G1063841
G1063841
 
Routing performance of structured overlay in Distributed Hash Tables (DHT) fo...
Routing performance of structured overlay in Distributed Hash Tables (DHT) fo...Routing performance of structured overlay in Distributed Hash Tables (DHT) fo...
Routing performance of structured overlay in Distributed Hash Tables (DHT) fo...
 
A novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manetA novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manet
 
Efficient Destination Discovery using Geographical Gossiping in MANETs
Efficient Destination Discovery using Geographical Gossiping in MANETsEfficient Destination Discovery using Geographical Gossiping in MANETs
Efficient Destination Discovery using Geographical Gossiping in MANETs
 
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACESDATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
 
A340105
A340105A340105
A340105
 
Shortcut Path Tress for Zigbee based Wireless Network
Shortcut Path Tress for Zigbee based Wireless NetworkShortcut Path Tress for Zigbee based Wireless Network
Shortcut Path Tress for Zigbee based Wireless Network
 
A novel approach for preventing black hole
A novel approach for preventing black holeA novel approach for preventing black hole
A novel approach for preventing black hole
 
Securing Data Communication for Node Anonymization Using Location Information
Securing Data Communication for Node Anonymization Using  Location InformationSecuring Data Communication for Node Anonymization Using  Location Information
Securing Data Communication for Node Anonymization Using Location Information
 
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
 
Robustness Analysis of Buffer Based Routing Algorithms in Wireless Mesh Network
Robustness Analysis of Buffer Based Routing Algorithms in Wireless Mesh NetworkRobustness Analysis of Buffer Based Routing Algorithms in Wireless Mesh Network
Robustness Analysis of Buffer Based Routing Algorithms in Wireless Mesh Network
 
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...
 

Viewers also liked

Performance Analysis of Dynamic Routing Protocols using OPNET
Performance Analysis of Dynamic Routing Protocols using OPNETPerformance Analysis of Dynamic Routing Protocols using OPNET
Performance Analysis of Dynamic Routing Protocols using OPNETMuzahidul Islam
 
Routing information protocol & rip configuration
Routing information protocol & rip configurationRouting information protocol & rip configuration
Routing information protocol & rip configuration3Anetwork com
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information ProtocolMiftahul Khair N
 
Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)
Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)
Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)Abdelkhalik Mosa
 
RIP Routing Information Protocol Extreme Networks
RIP Routing Information Protocol Extreme NetworksRIP Routing Information Protocol Extreme Networks
RIP Routing Information Protocol Extreme NetworksDani Royman Simanjuntak
 
RIP - Routing Information Protocol
RIP - Routing Information ProtocolRIP - Routing Information Protocol
RIP - Routing Information Protocolselvakumar_b1985
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information ProtocolKashif Latif
 
Routing Information Protocol (RIP)
Routing Information Protocol(RIP)Routing Information Protocol(RIP)
Routing Information Protocol (RIP)waqasahmad1995
 

Viewers also liked (10)

Performance Analysis of Dynamic Routing Protocols using OPNET
Performance Analysis of Dynamic Routing Protocols using OPNETPerformance Analysis of Dynamic Routing Protocols using OPNET
Performance Analysis of Dynamic Routing Protocols using OPNET
 
Routing information protocol & rip configuration
Routing information protocol & rip configurationRouting information protocol & rip configuration
Routing information protocol & rip configuration
 
Rip
RipRip
Rip
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information Protocol
 
Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)
Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)
Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)
 
RIP Routing Information Protocol Extreme Networks
RIP Routing Information Protocol Extreme NetworksRIP Routing Information Protocol Extreme Networks
RIP Routing Information Protocol Extreme Networks
 
RIP - Routing Information Protocol
RIP - Routing Information ProtocolRIP - Routing Information Protocol
RIP - Routing Information Protocol
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information Protocol
 
Routing Information Protocol (RIP)
Routing Information Protocol(RIP)Routing Information Protocol(RIP)
Routing Information Protocol (RIP)
 
PERFORMANCE EVALUATION OF RIP AND OSPF IN IPV6 USING OPNET 14.5 SIMULATOR
PERFORMANCE EVALUATION OF RIP AND OSPF IN IPV6 USING OPNET 14.5 SIMULATORPERFORMANCE EVALUATION OF RIP AND OSPF IN IPV6 USING OPNET 14.5 SIMULATOR
PERFORMANCE EVALUATION OF RIP AND OSPF IN IPV6 USING OPNET 14.5 SIMULATOR
 

Similar to Comparing RIPv2 and EIGRP Packet Delivery Times

Performance analysis and evaluation of distance vector and link state routing...
Performance analysis and evaluation of distance vector and link state routing...Performance analysis and evaluation of distance vector and link state routing...
Performance analysis and evaluation of distance vector and link state routing...TELKOMNIKA JOURNAL
 
Network Performance Analysis of Dynamic Routing Protocols for Real Time Appl...
Network Performance Analysis of Dynamic Routing Protocols for  Real Time Appl...Network Performance Analysis of Dynamic Routing Protocols for  Real Time Appl...
Network Performance Analysis of Dynamic Routing Protocols for Real Time Appl...IJMER
 
Paper id 21201449
Paper id 21201449Paper id 21201449
Paper id 21201449IJRAT
 
A Comparative Performance Analysis of Route Redistribution among Three Differ...
A Comparative Performance Analysis of Route Redistribution among Three Differ...A Comparative Performance Analysis of Route Redistribution among Three Differ...
A Comparative Performance Analysis of Route Redistribution among Three Differ...IJCNCJournal
 
OSPF EIGRP & RIP comparision.pdf
OSPF EIGRP & RIP comparision.pdfOSPF EIGRP & RIP comparision.pdf
OSPF EIGRP & RIP comparision.pdfKOLOYOYO
 
Comparative Study between OSPF and MPLS network using OPNET Simulation
Comparative Study between OSPF and MPLS network using OPNET SimulationComparative Study between OSPF and MPLS network using OPNET Simulation
Comparative Study between OSPF and MPLS network using OPNET Simulationiosrjce
 
Performance Evaluation of Routing Protocols in University Network
Performance Evaluation of Routing Protocols in University NetworkPerformance Evaluation of Routing Protocols in University Network
Performance Evaluation of Routing Protocols in University Networkijtsrd
 
Location Based Routing Protocols and its Performances in Wireless Sensor Netw...
Location Based Routing Protocols and its Performances in Wireless Sensor Netw...Location Based Routing Protocols and its Performances in Wireless Sensor Netw...
Location Based Routing Protocols and its Performances in Wireless Sensor Netw...Prashanta Bairagi
 
Routing protocol : Notes
Routing protocol : NotesRouting protocol : Notes
Routing protocol : NotesSubhajit Sahu
 
OSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil NembangOSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil NembangAnil Nembang
 
Analysis of RIP, EIGRP, and OSPF Routing Protocols in a Network
Analysis of RIP, EIGRP, and OSPF Routing Protocols in a NetworkAnalysis of RIP, EIGRP, and OSPF Routing Protocols in a Network
Analysis of RIP, EIGRP, and OSPF Routing Protocols in a Networkijtsrd
 
Routing protocol : Notes
Routing protocol : NotesRouting protocol : Notes
Routing protocol : NotesSubhajit Sahu
 
A detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingA detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingIAEME Publication
 
A detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingA detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingIAEME Publication
 
Ncct Ieee Software Abstract Collection Volume 2 50+ Abst
Ncct   Ieee Software Abstract Collection Volume 2   50+ AbstNcct   Ieee Software Abstract Collection Volume 2   50+ Abst
Ncct Ieee Software Abstract Collection Volume 2 50+ Abstncct
 
Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...
Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...
Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...theijes
 

Similar to Comparing RIPv2 and EIGRP Packet Delivery Times (20)

Performance analysis and evaluation of distance vector and link state routing...
Performance analysis and evaluation of distance vector and link state routing...Performance analysis and evaluation of distance vector and link state routing...
Performance analysis and evaluation of distance vector and link state routing...
 
Network Performance Analysis of Dynamic Routing Protocols for Real Time Appl...
Network Performance Analysis of Dynamic Routing Protocols for  Real Time Appl...Network Performance Analysis of Dynamic Routing Protocols for  Real Time Appl...
Network Performance Analysis of Dynamic Routing Protocols for Real Time Appl...
 
Paper id 21201449
Paper id 21201449Paper id 21201449
Paper id 21201449
 
Different Routing protocols
Different Routing protocolsDifferent Routing protocols
Different Routing protocols
 
A Comparative Performance Analysis of Route Redistribution among Three Differ...
A Comparative Performance Analysis of Route Redistribution among Three Differ...A Comparative Performance Analysis of Route Redistribution among Three Differ...
A Comparative Performance Analysis of Route Redistribution among Three Differ...
 
OSPF EIGRP & RIP comparision.pdf
OSPF EIGRP & RIP comparision.pdfOSPF EIGRP & RIP comparision.pdf
OSPF EIGRP & RIP comparision.pdf
 
Comparative Study between OSPF and MPLS network using OPNET Simulation
Comparative Study between OSPF and MPLS network using OPNET SimulationComparative Study between OSPF and MPLS network using OPNET Simulation
Comparative Study between OSPF and MPLS network using OPNET Simulation
 
H010634043
H010634043H010634043
H010634043
 
K017426872
K017426872K017426872
K017426872
 
Performance Evaluation of Routing Protocols in University Network
Performance Evaluation of Routing Protocols in University NetworkPerformance Evaluation of Routing Protocols in University Network
Performance Evaluation of Routing Protocols in University Network
 
Location Based Routing Protocols and its Performances in Wireless Sensor Netw...
Location Based Routing Protocols and its Performances in Wireless Sensor Netw...Location Based Routing Protocols and its Performances in Wireless Sensor Netw...
Location Based Routing Protocols and its Performances in Wireless Sensor Netw...
 
Routing protocol : Notes
Routing protocol : NotesRouting protocol : Notes
Routing protocol : Notes
 
OSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil NembangOSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil Nembang
 
Analysis of RIP, EIGRP, and OSPF Routing Protocols in a Network
Analysis of RIP, EIGRP, and OSPF Routing Protocols in a NetworkAnalysis of RIP, EIGRP, and OSPF Routing Protocols in a Network
Analysis of RIP, EIGRP, and OSPF Routing Protocols in a Network
 
C0343015019
C0343015019C0343015019
C0343015019
 
Routing protocol : Notes
Routing protocol : NotesRouting protocol : Notes
Routing protocol : Notes
 
A detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingA detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks using
 
A detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingA detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks using
 
Ncct Ieee Software Abstract Collection Volume 2 50+ Abst
Ncct   Ieee Software Abstract Collection Volume 2   50+ AbstNcct   Ieee Software Abstract Collection Volume 2   50+ Abst
Ncct Ieee Software Abstract Collection Volume 2 50+ Abst
 
Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...
Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...
Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...
 

More from Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

More from Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Recently uploaded

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 

Comparing RIPv2 and EIGRP Packet Delivery Times

  • 1. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol.3, No.6, 2013 17 Protocol Data Unit (PDU): A Simulation MaryAnne B. Taquiqui, PhD College of Computer Science, AMA International University – Bahrain Kingdom of Bahrain anne1012ph@gmail.com , mbtaquiqui@amaiu.edu.bh Abstract The use of routing protocols plays an essential and major role on the performance of a network. These protocols vary in terms of its application, features and configuration and management. Each routing protocol exhibits some characteristics which may be the same or may differ with other protocols. While there are protocols categorized as distance-vector and link state protocols, this study investigates Routing Information Protocol specifically, version 2 (RIPv2), and Enhanced Interior Gateway Routing Protocol. The purpose of which, is to compare these two protocols on the basis a Protocol Data Unit that is sent from a specific source to a destination. The performance activity of a packet as it moves toward the destination is simulated and as a result will show which packet will arrive first under certain circumstances. Keywords: Protocol Data Unit (PDU), Routing Information Protocol (RIP), Enhanced Interior Gateway Routing Protocol (EIGRP), Variable Length Subnet Mask (VSLM), Classless, Packet Introduction In a packet-switched network, routing protocols play a significant role on how protocol data unit travel through the network. The utilization of these protocols, among other factors, governs the behavior of packets from the source up to the destination. Routing protocols, such as Routing Information Protocol and Enhanced Interior Gateway Routing Protocol are some of the used protocols today. These dynamic routing protocols are used to find networks and update routing tables on routers. In this study, RIP version 2 and EIGRP were used in the configuration of the routers. RIPv2 is a distance-vector routing protocol, hence, uses hop count in the determination of the best path to a remote network. EIGRP, on the other hand, is an enhanced distance-vector protocol which uses the idea of autonomous system in describing the set of adjacent routers running the same routing protocol and share routing information. Both protocols support Variable Length Subnet Mask (VLSM) networks. For purposes of determining the time it takes for a packet to reach the destination, from a specified source to a specified destination, a given network scenario was presented, having the same classless addressing scheme but with the application of the two different routing protocols as mentioned. This research aimed to examine the performance of a network in terms of the time it takes a packet to arrive at the destination, passing through several intermediary devices. Related Studies In a study conducted by Xu, et.al (2011), “routing protocols are key elements of modern communication networks. Currently deployed dynamic routing protocols that are used to propagate network topology information to the neighboring routers are Routing Information Protocol (RIP), Enhanced Interior Gateway Routing Protocol (EIGRP), and the Open Shortest Path First (OSPF) protocol. The choice of the right routing protocol depends on a number of parameters. In their paper, they used OPNET Modeler to analyze the performance of RIP, EIGRP, and the OSPF protocols, which are commonly deployed in Internet Protocol (IP) networks. They designed various simulation scenarios to compare their performance in terms of network convergence, routing traffic, ethernet delay, email upload response time, video-conferencing packet end-to-end delay, and voice packet delay. Simulation results indicate that RIP performs better in terms of voice packet delay
  • 2. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol.3, No.6, 2013 18 because it is a simple routing protocol that relies on distance vector algorithms. RIP generates less protocol traffic compared to EIGRP and OSPF, especially in medium size networks simulated in this project. RIP’s weakness is slower convergence time in larger networks. This weakness may cause inconsistent routing entries and occasionally results in routing loops or metrics approaching infinity. RIP is preferred in networks smaller than 15 hops. EIGRP performs better in terms of network convergence, routing traffic, and Ethernet delay. EIGRP has the characteristics of both distance vector and link state protocols, has improved network convergence, reduced routing protocol traffic, and less CPU and RAM utilization compared to RIP and the OSPF protocol”. In another study conducted by Ayub, et.al (2011), “the main goal behind their investigation was to provide understanding of Interior Gateway Protocols (OSPF and EIGRP) regarding best possible efficiency, and to provide a guideline for optimal use while choosing routing protocols to obtain faster convergence and improved performance. Different routing protocols were defined on the basis of their comparative performance regarding to the convergence and link state advertisements (LSAs). Various scenarios have been considered and these were analyzed with simulation tool OPNET. Among the various findings of their study: the most important regarding convergence issues are the better performance of EIGRP as compared to OSPF. EIGRP found much better on basis of its good CPU utilization, less time consumption, better convergence performance and ease in management.” Methodology The study made use of theoretical presentation of RIPv2 and EIGRP along their features and implementation. Further, an experimental method through the Packet Tracer Simulation Tool was utilized in determining the time it takes a PDU to reach a specific destination. The data was analyzed by averaging the time the PDU passed through one device to another towards the remote network. Results The network scenario comprised of three subnets, each of which had been assigned of an IP address which was subnetted in a classless method. The experiment consisted of 3 Cisco routers and switches. The end devices (PC) are a representation of the actual number of hosts. For purposes of showing that hosts are connected, 2 hosts per subnet were used. Table 1 shows the hardware used; Table 2 shows the addressing scheme; Figure1 shows the Time Difference between RIPv2 and EIGRP; and Figure 2 shows the network topology used for the simulation. With a given network topology, having the same IP addresses, but configured with two different protocols, it can be seen from the results that one protocol exceeds the other in terms of the time it takes a packet to reach the destination. In the scenario presented, a PDU was sent from a specific host in one subnet to a host in another subnet. And with 10 instances using the Packet Tracer simulator, the average time it took for RIPv2 packet is faster than the EIGRP network. Conclusion Based on the presentation of data and the results generated, it can be deduced that, for a similar network scenario and circumstances and using the simulator, the use of the RIPv2 protocol in a network leads to a packet reaching the destination faster than EIGRP. This can be anchored on the experimentation done. References Ayub, N., et al. (2011). Performance Analysis of OSPF and EIGRP Routing Protocols with Respect to the Convergence, European Journal of Scientific Research, ISSN 1450-216X Vol. 61 No. 3, pp434-447. Farhangi, S. et al. (2012). Performance Comparison of Mixed Protocols Based on EIGRP, IS-IS and OSPF for Real Time Applications, Middle-East Journal of Scientific Research 12 (11): 1502-1508, 2012 ISSN 1990-9233
  • 3. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol.3, No.6, 2013 19 Islam, M., et al. (2010). Simulation Based EIGRP over OSPF Performance Analysis, Blekinge Institute of Technology,http://www.bth.se/com/mscee.nsf/attachments/4983_Thesis_Report_pdf/$file/4983_Thesis_Report.p df. Lammle, Todd. (2011). Cisco Certified Network Associate Study Guide , Wiley Publishing, Inc., Seventh Edition. McQuerry, Steve. (2008). Interconnecting Cisco Network Devices, Part 2 (ICND2), Cisco Systems Inc., Cisco Press. Thorenoor, S. (2010). Dynamic Routing Protocol Implementation Decision between EIGRP, OSPF and RIP based on Technical Background Using OPNET Modeler, Proceedings of the 2010 Second International Conference on Computer and Network Technology, IEEE Computer Society. Wu, B. (2011). Simulation Based Performance Analyses on RIPv2, EIGRP , and OSPF Using OPNET, Math and Computer Science Working Paper, Fayettville State University, http://digitalcommons.uncfsu.edu/cgi/viewcontent.cgi?article=1011&context=macsc_wp. Xu, D., et al., (2011). Performance Analysis of RIP, EIGRP, and OSPF using OPNET, http://www2.ensc.sfu.ca/people/faculty/ljilja/cnl/presentations/xu/OW2011_presentation_donx_final.pdf. Mary Anne B. Taquiqui, Ph.D, Coordinator, Continuous Quality Improvement and Faculty Member, College of Computer Studies, AMA International University – Bahrain; Cisco Curriculum Lead/Cisco Instructor- AMAIUB; Cisco Certified Entry Networking Technician; Member, IEEE. Email: mbtaquiqui@amaiu.edu.bh , anne1012ph@gmail.com Notes Table 1. Hardware Used Device Name Model Router 0, Router 1, Router 2 Cisco 1841 Switch 0, Switch 1, Switch 2 Cisco 2960 Table 1 shows the devices which are used in the network topology. PC0, PC1 and PC5 are representation of the actual hosts which can be used (refer to Table 2). Serial DCE is used for the link and Straight-through cables are used for the interconnection between switch to PC and switch to router.
  • 4. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol.3, No.6, 2013 20 Table 2. Addressing Scheme Subnet Name Needed Size Allocated Size Network Address Host Address Broadcast Address Subnet Mask A 30 30 192.168.1.0/27 192.168.1.1 - 192.168.1.30 192.168.1.31 255.255.255.224 B 10 14 192.168.1.32/28 192.168.1.33 - 192.168.1.46 192.168.1.47 255.255.255.240 C 3 6 192.168.1.48/29 192.168.1.49 - 192.168.1.54 192.168.1.55 255.255.255.248 D 2 2 192.168.1.56/30 192.168.1.57 - 192.168.1.58 192.168.1.59 255.255.255.252 E 2 2 192.168.1.60/30 192.168.1.61 - 192.168.1.62 192.168.1.63 255.255.255.252 Table 2 shows the addressing scheme for the network. The Major Network is 192.168.1.0/24; Available IP addresses in major network: 254; Number of IP addresses needed: 47; Available IP addresses in allocated subnets: 54; About 25% of available major network address space is used; About 87% of subnetted network address space is used. Figure1. Time Difference between RIPv2 and EIGRP Figure 1 shows the graph of the 10 instances with which the PDU was sent from source to destination. Values are presented in seconds. On the average, RIPv2 packet reached faster than EIGRP packet.
  • 5. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol.3, No.6, 2013 21 Figure 2. Network Scenario Figure 2 shows the network scenario used for both protocols.
  • 6. This academic article was published by The International Institute for Science, Technology and Education (IISTE). The IISTE is a pioneer in the Open Access Publishing service based in the U.S. and Europe. The aim of the institute is Accelerating Global Knowledge Sharing. More information about the publisher can be found in the IISTE’s homepage: http://www.iiste.org CALL FOR JOURNAL PAPERS The IISTE is currently hosting more than 30 peer-reviewed academic journals and collaborating with academic institutions around the world. There’s no deadline for submission. Prospective authors of IISTE journals can find the submission instruction on the following page: http://www.iiste.org/journals/ The IISTE editorial team promises to the review and publish all the qualified submissions in a fast manner. All the journals articles are available online to the readers all over the world without financial, legal, or technical barriers other than those inseparable from gaining access to the internet itself. Printed version of the journals is also available upon request of readers and authors. MORE RESOURCES Book publication information: http://www.iiste.org/book/ Recent conferences: http://www.iiste.org/conference/ IISTE Knowledge Sharing Partners EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open Archives Harvester, Bielefeld Academic Search Engine, Elektronische Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial Library , NewJour, Google Scholar