SlideShare a Scribd company logo
1 of 45
NETWORK
DESIGN & ANALYSIS
Dr. Liyth Nissirat
Addressing and Routing Architecture
โ€ข Objectives
โ€ข Background
โ€ข Addressing Mechanisms
โ€ข Routing Mechanisms
โ€ข Addressing Strategies
โ€ข Routing Strategies
โ€ข Architectural Considerations
Addressing and Routing Architecture
Addressing Mechanisms
โ€ข Classful Addressing
โ€ข Subnetting
โ€ข Variable-Length Subnetting
โ€ข Supernetting
โ€ข Private Addressing and NAT
Addressing and Routing Architecture
Addressing Mechanisms
Private Addressing and NAT
โ€ข Private IP addresses are those that cannot be advertised and forwarded by
network devices in the public domain.
โ€ข This was originally established to help with address space depletion in the
Internet, for if networks that would normally be allocated public address
space instead use private address space, those public addresses would remain
available.
Addressing and Routing Architecture
Addressing Mechanisms
Private Addressing and NAT
There is a side benefit of using private addresses.
๏ƒ˜ It turns out that because these addresses are not advertised and forwarded in the Internet, they have an
additional degree of security.
โ€ข NAT maps IP addresses between public and private spaces.
โ€ข In translating between public and private address spaces, NAT creates bindings between
addresses.
โ€ข These can be one-to-one address bindings (known as static NAT), one-to-many address bindings
(known as dynamic NAT), and address and port bindings (known as network address port
translation, or NAPT).
โ€ข Often combinations of static, dynamic, and NAPT bindings are used in a network. For example,
dynamic NAT is often used for user devices, and static NAT for servers.
Addressing and Routing Architecture
Routing Mechanisms
โ€ข Establishing Routing Flows
โ€ข Identifying and Classifying Routing Boundaries
โ€ข Manipulating Routing Flows
Addressing and Routing Architecture
Routing Mechanisms
Establishing Routing Flows
โ€ข In preparing to discuss boundaries and route manipulation, we want to understand
how flows will likely be routed through the network.
โ€ข Determining routing flows begins with the flow analysis process.
โ€ข Functional areas (FA) are groups within the system that share a similar function.
โ€ข Groups may be of users (workgroups), applications, devices, or combinations of
these, and they may share similar jobs/tasks, physical locations, or functions within
the network (e.g., backbone routing).
โ€ข Workgroups (WG) are groups of users that have common locations, applications, and
requirements, or that belong to the same organization.
Addressing and Routing Architecture
Routing Mechanisms
Establishing Routing Flows
โ€ข The purpose of functional areas is to simplify the routing architecture. They
can cross physical boundaries, such as rooms, floors, and buildings. A
workgroup is similar to a functional area, but one level lower in hierarchy.
โ€ข Consider Figure 6.12. In this figure there are multiple workgroups, in this
case based on organizations within a company. Functional areas are created:
the Scientists and Accounting groups in Building C, the two Management
workgroups in Building B, the Scientists groups across Buildings A and C,
and the backbone between the buildings. Notice that functional areas are
connected with routers.
Addressing and Routing Architecture
Routing Mechanisms
Establishing Routing Flows
Addressing and Routing Architecture
Routing Mechanisms
Identifying and Classifying Routing Boundaries
โ€ข Routing boundaries are physical or logical separations of a network, based on
requirements for or administration of that network.
โ€ข Physical boundaries can be identified by isolation LANs or demilitarized
zones (DMZs); physical interfaces on network equipment; or physical
security.
โ€ข Logical boundaries can be identified by functional areas, workgroups,
administrative domains, such as autonomous systems (ASs), and routing
management domains.
Addressing and Routing Architecture
Routing Mechanisms
Identifying and Classifying Routing Boundaries
Addressing and Routing Architecture
Routing Mechanisms
Identifying and Classifying Routing Boundaries
Addressing and Routing Architecture
Routing Mechanisms
Identifying and Classifying Routing Boundaries
Addressing and Routing Architecture
Routing Mechanisms
Manipulating Routing Flows
โ€ข Manipulating (i.e., controlling) routing flows within the network is vital to the
proper operation and performance of the network.
โ€ข The right combination of addressing and routing is important in this
process, to localize routing flows whenever possible.
โ€ข There are several techniques for manipulating routing flows at hard and soft
boundaries.
โ€ข A default route is the route used when there is no other route for that
destination.
Addressing and Routing Architecture
Routing Mechanisms
Manipulating Routing Flows
โ€ข Route filtering is the technique of applying route filters to hide networks from the rest
of an AS, or to add, delete, or modify routes in the routing table.
โ€ข A route filter is a statement, configured in one or more routers, that identifies one or
more IP parameters (e.g., an IP source or destination address) and an action (e.g.,
drop or forward) to be taken when traffic matches these parameters.
โ€ข Route aggregation is the technique exchanging of routing information between ASs,
usually between service providers with transit networks, and between large customer
networks.
Addressing and Routing Architecture
Routing Mechanisms
Manipulating Routing Flows
โ€ข Policies are higher-level abstractions of the route filter technique described previously. Just as a route
filter takes an action (e.g., drop, accept, modify) on traffic that matches one or more parameters (e.g.,
IP addresses), a policy takes a similar action on traffic that matches one or more AS parameters (e.g.,
AS number or list of AS numbers and metrics, time of day, cost).
Addressing and Routing Architecture
Routing Mechanisms
Manipulating Routing Flows
Addressing and Routing Architecture
Routing Mechanisms
Manipulating Routing Flows
Addressing and Routing Architecture
Routing Mechanisms
Manipulating Routing Flows
Addressing and Routing Architecture
Addressing Strategies
โ€ข During the requirements analysis process, it is important to gather
information about device growth expectations, so that you can avoid having
to change addressing schemes and reconfigure device addresses during the
life cycle of the network.
โ€ข When applying subnetting, variable-length subnetting, classful addressing,
supernetting, private addressing and NAT, and dynamic addressing, we want
to make sure that our network addresses and masks will scale to the sizes of
the areas they will be assigned to. We also want to establish the degrees of
hierarchy in the network.
Addressing and Routing Architecture
Addressing Strategies
To scale the network addressing, we will use the numbers of
๏ƒ˜ Functional areas within the network
๏ƒ˜ Workgroups within each functional area
๏ƒ˜ Subnets within each workgroup
๏ƒ˜ Total numbers of subnets (current and future) in the organization
๏ƒ˜ Total numbers of devices (current and future) within each subnet
Addressing and Routing Architecture
Addressing Strategies
Addressing and Routing Architecture
Addressing Strategies
Addressing and Routing Architecture
Addressing Strategies
Addressing and Routing Architecture
Routing Strategies
โ€ข Evaluating Routing Protocols
โ€ข Choosing and Applying Routing Protocols
Addressing and Routing Architecture
Routing Strategies
Evaluating Routing Protocols
โ€ข Now we briefly examine and compare some popular IGPs and EGP:
๏ƒ˜ The routing information protocol (RIP and RIPv2)
๏ƒ˜ The open shortest-path first (OSPF) routing protocol
๏ƒ˜ The border gateway protocol version 4 (BGPv4)
โ€ข We also consider the limited use of static routes in the network.
๏ƒ˜ Static routes are routes that are configured manually, by network personnel or scripts, in
network devices, and that do not change until manually deleted or modified.
Addressing and Routing Architecture
Routing Strategies
Evaluating Routing Protocols
โ€ข A stub network is a network with only one path into or out of it, as in Figure 6.23.
Addressing and Routing Architecture
Routing Strategies
Evaluating Routing Protocols
โ€ข RIP and RIPv2 are IGPs that are based on a distance-vector routing
algorithm.
โ€ข This implies some characteristics of the dynamic behavior of RIP/RIPv2-
routed networks. RIP and, to a lesser degree, RIPv2 are relatively
straightforward to implement and maintain.
โ€ข RIP/RIPv2 should be considered when there is low to medium hierarchy
and diversity in the network. Degrees of hierarchy and diversity are shown in
Figure 6.24.
Addressing and Routing Architecture
Routing Strategies
Evaluating Routing Protocols
Addressing and Routing Architecture
Routing Strategies
Evaluating Routing Protocols
โ€ข OSPF is an IGP that is based on a link-state algorithm. Like RIP/RIPv2, the
choice of routing algorithm affects the characteristics of the protocol.
โ€ข In the case of OSPF, the use of a link-state algorithm results in a faster
convergence time when changes in the routing topology occur.
โ€ข OSPF also supports an area abstraction, which provides a hierarchy for
routing information.
โ€ข OSPF should be considered when there is high hierarchy and diversity in the
network, as shown in Figure 6.24.
Addressing and Routing Architecture
Routing Strategies
Evaluating Routing Protocols
Addressing and Routing Architecture
Routing Strategies
Evaluating Routing Protocols
โ€ข BGPv4 (or BGP) is a path-vector-based EGP. A path-vector algorithm is
similar to a distance-vector algorithm, such as that used in RIP; however, it
operates on ASs or lists of ASs (paths). In addition, BGP can use policies to
determine actions to be taken on paths.
โ€ข BGP exchanges routing information by establishing peering connections
using TCP with a user-defined list. BGP is used to enforce network transport
policies for an AS, such as allowing all routes from a certain AS to use this
AS as a transit route; rejecting all routes that have been learned from a
certain AS; and only announcing certain routes from this AS to other peers.
Addressing and Routing Architecture
Routing Strategies
Evaluating Routing Protocols
โ€ข BGP operates between ASs, yet there may be a number of routers (termed border
routers) that connect to external networks. As such, there needs to be a mechanism
for border routers from the same AS to communicate path information, so that it
can be passed to multiple ASs (see Figure 6.25).
โ€ข Therefore, there are two types of BGP:
๏ƒ˜ external BGP and internal BGP. External BGP (eBGP) is the โ€œnormalโ€ operational mode
of BGP: passing path information between ASs.
๏ƒ˜ Internal BGP (iBGP) is used to form tunnels between border routers within an AS, in order
to pass path information across that AS.
Addressing and Routing Architecture
Routing Strategies
Evaluating Routing Protocols
Addressing and Routing Architecture
Routing Strategies
Choosing and Applying Routing Protocols
Some recommendations for choosing and applying routing protocols for your
network.
1. Minimize the number of routing protocols used in the network. Two should be the
maximum number of protocols allowed, with only one IGP.
2. Start with the simplest routing strategy and routing mechanism/protocol.
3. As the complexity in routing and choices of routing protocols increase, reevaluate the
previous decisions.
Addressing and Routing Architecture
Routing Strategies
Choosing and Applying Routing Protocols
โ€ข Starting with the simplest routing mechanism (static routes) and working our
way up to more complex mechanisms, we usually start with the outer edges
of the network, where hierarchy and diversity are lowest, and work our way
toward the center, or backbone, of the network, where hierarchy and
diversity are highest (Figure 6.26).
Addressing and Routing Architecture
Routing Strategies
Choosing and Applying Routing Protocols
Addressing and Routing Architecture
Routing Strategies
Choosing and Applying Routing Protocols
โ€ข In applying routing protocols we start by evaluating the degrees of hierarchy and
diversity of each functional area and considering any other factors for that
functional area or features of the routing protocols that may apply.
โ€ข When a change is made in the choice of routing protocol, such as from static routes
to RIP/RIPv2, from RIP/RIPv2 to OSPF, or from RIP/RIPv2/OSPF to BGP,
โ€ข We need to reevaluate functional areas where routing protocols or static routes have
already been chosen.
โ€ข In general, RIP/RIPv2 supersedes static routes, and OSPF supersedes RIP/RIPv2.
But remember that you can also consider combining the protocols within the
network. Figure 6.27 illustrates the process of applying routing protocols.
Addressing and Routing Architecture
Routing Strategies
Choosing and Applying Routing Protocols
Addressing and Routing Architecture
Architectural Considerations
โ€ข Internal Relationships
โ€ข External Relationships
Addressing and Routing Architecture
Architectural Considerations
Internal Relationships
โ€ข Depending on the type of network being developed, the set of candidate
addressing and forwarding mechanisms for a component architecture can be
quite different.
โ€ข Two types of interactions are predominant within this component
architecture:
๏ƒ˜ Trade-offs between addressing and forwarding mechanisms
๏ƒ˜ Trade-offs within addressing or within forwarding.
Addressing and Routing Architecture
Architectural Considerations
Internal Relationships
Addressing and Routing Architecture
Architectural Considerations
External Relationships
โ€ข External relationships are trade-offs, dependencies, and constraints between
the addressing/routing architecture and each of the other component
architectures (network management, performance, security, and any other
component architectures you may develop).
โ€ข There are common external relationships between addressing/ routing and
each of the other component architectures
Addressing and Routing Architecture
Architectural Considerations
External Relationships
Some of common external relationships between addressing/ routing and each
of the other component architectures
๏ƒ˜ Interactions between addressing/routing and network management.
๏ƒ˜ Interactions between addressing/routing and performance.
๏ƒ˜ Interactions between addressing/routing and security.
Thank you

More Related Content

Similar to network design 8.pptx

Slides of Chapter 3 network design and management book
Slides of Chapter 3 network design and management bookSlides of Chapter 3 network design and management book
Slides of Chapter 3 network design and management bookMuhammad Shafiq
ย 
Chapter5 16 marks for PG PAWSN
Chapter5 16 marks for PG PAWSNChapter5 16 marks for PG PAWSN
Chapter5 16 marks for PG PAWSNDhaya kanthavel
ย 
SOA1-Background.ppt SOFTWARE ORIENTED SERVICES AND ARCHITECTURE
SOA1-Background.ppt SOFTWARE ORIENTED SERVICES AND ARCHITECTURESOA1-Background.ppt SOFTWARE ORIENTED SERVICES AND ARCHITECTURE
SOA1-Background.ppt SOFTWARE ORIENTED SERVICES AND ARCHITECTUREAnyaForger34
ย 
ใ€EPN Seminar Nov.10. 2015ใ€‘ใ€€ใƒ‘ใƒใƒซใƒ‡ใ‚ฃใ‚นใ‚ซใƒƒใ‚ทใƒงใƒณใ€€ใใฎ2๏ผšใ€€BGP Peering Engineering Automatio...
ใ€EPN Seminar Nov.10. 2015ใ€‘ใ€€ใƒ‘ใƒใƒซใƒ‡ใ‚ฃใ‚นใ‚ซใƒƒใ‚ทใƒงใƒณใ€€ใใฎ2๏ผšใ€€BGP Peering Engineering Automatio...ใ€EPN Seminar Nov.10. 2015ใ€‘ใ€€ใƒ‘ใƒใƒซใƒ‡ใ‚ฃใ‚นใ‚ซใƒƒใ‚ทใƒงใƒณใ€€ใใฎ2๏ผšใ€€BGP Peering Engineering Automatio...
ใ€EPN Seminar Nov.10. 2015ใ€‘ใ€€ใƒ‘ใƒใƒซใƒ‡ใ‚ฃใ‚นใ‚ซใƒƒใ‚ทใƒงใƒณใ€€ใใฎ2๏ผšใ€€BGP Peering Engineering Automatio...ใ‚ทใ‚นใ‚ณใ‚ทใ‚นใƒ†ใƒ ใ‚บๅˆๅŒไผš็คพ
ย 
Systems and network architectures
Systems and network architecturesSystems and network architectures
Systems and network architecturescsk selva
ย 
Network architecture - part-I
Network architecture - part-INetwork architecture - part-I
Network architecture - part-Icsk selva
ย 
Software defined networking
Software defined networkingSoftware defined networking
Software defined networkingProf. Dr. Noman Islam
ย 
Andrea Sini Thesis
Andrea Sini ThesisAndrea Sini Thesis
Andrea Sini ThesisAndrea Sini, MBA
ย 
architectural design
 architectural design architectural design
architectural designPreeti Mishra
ย 
windows server installation procedure or
windows server installation procedure orwindows server installation procedure or
windows server installation procedure orYogeshKumar187055
ย 
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...IRJET Journal
ย 
The UCLouvain Public Defense of my EMJD-DC Double Doctorate Ph.D. degree
The UCLouvain Public Defense of my EMJD-DC Double Doctorate Ph.D. degreeThe UCLouvain Public Defense of my EMJD-DC Double Doctorate Ph.D. degree
The UCLouvain Public Defense of my EMJD-DC Double Doctorate Ph.D. degreePradeeban Kathiravelu, Ph.D.
ย 
Sdn
SdnSdn
SdnMike Aro
ย 
Public Seminar_Final 18112014
Public Seminar_Final 18112014Public Seminar_Final 18112014
Public Seminar_Final 18112014Hossam Hassan
ย 
Diksha sda presentation
Diksha sda presentationDiksha sda presentation
Diksha sda presentationdikshagupta111
ย 
WINSEM2023-24_BCSE429L_TH_CH2023240501528_Reference_Material_III_S3-Homoheter...
WINSEM2023-24_BCSE429L_TH_CH2023240501528_Reference_Material_III_S3-Homoheter...WINSEM2023-24_BCSE429L_TH_CH2023240501528_Reference_Material_III_S3-Homoheter...
WINSEM2023-24_BCSE429L_TH_CH2023240501528_Reference_Material_III_S3-Homoheter...KumarSuman24
ย 
Automatic Ip Address Assignment on Network Topologies.pdf
Automatic Ip Address Assignment on Network Topologies.pdfAutomatic Ip Address Assignment on Network Topologies.pdf
Automatic Ip Address Assignment on Network Topologies.pdfHolly Fisher
ย 
06.CS2005-NetworkLayer-2021_22(1) (1).pptx
06.CS2005-NetworkLayer-2021_22(1) (1).pptx06.CS2005-NetworkLayer-2021_22(1) (1).pptx
06.CS2005-NetworkLayer-2021_22(1) (1).pptxPocketRocketDC
ย 

Similar to network design 8.pptx (20)

Slides of Chapter 3 network design and management book
Slides of Chapter 3 network design and management bookSlides of Chapter 3 network design and management book
Slides of Chapter 3 network design and management book
ย 
Chapter5 16 marks for PG PAWSN
Chapter5 16 marks for PG PAWSNChapter5 16 marks for PG PAWSN
Chapter5 16 marks for PG PAWSN
ย 
SOA1-Background.ppt SOFTWARE ORIENTED SERVICES AND ARCHITECTURE
SOA1-Background.ppt SOFTWARE ORIENTED SERVICES AND ARCHITECTURESOA1-Background.ppt SOFTWARE ORIENTED SERVICES AND ARCHITECTURE
SOA1-Background.ppt SOFTWARE ORIENTED SERVICES AND ARCHITECTURE
ย 
ใ€EPN Seminar Nov.10. 2015ใ€‘ใ€€ใƒ‘ใƒใƒซใƒ‡ใ‚ฃใ‚นใ‚ซใƒƒใ‚ทใƒงใƒณใ€€ใใฎ2๏ผšใ€€BGP Peering Engineering Automatio...
ใ€EPN Seminar Nov.10. 2015ใ€‘ใ€€ใƒ‘ใƒใƒซใƒ‡ใ‚ฃใ‚นใ‚ซใƒƒใ‚ทใƒงใƒณใ€€ใใฎ2๏ผšใ€€BGP Peering Engineering Automatio...ใ€EPN Seminar Nov.10. 2015ใ€‘ใ€€ใƒ‘ใƒใƒซใƒ‡ใ‚ฃใ‚นใ‚ซใƒƒใ‚ทใƒงใƒณใ€€ใใฎ2๏ผšใ€€BGP Peering Engineering Automatio...
ใ€EPN Seminar Nov.10. 2015ใ€‘ใ€€ใƒ‘ใƒใƒซใƒ‡ใ‚ฃใ‚นใ‚ซใƒƒใ‚ทใƒงใƒณใ€€ใใฎ2๏ผšใ€€BGP Peering Engineering Automatio...
ย 
Systems and network architectures
Systems and network architecturesSystems and network architectures
Systems and network architectures
ย 
Network architecture - part-I
Network architecture - part-INetwork architecture - part-I
Network architecture - part-I
ย 
Software defined networking
Software defined networkingSoftware defined networking
Software defined networking
ย 
Andrea Sini Thesis
Andrea Sini ThesisAndrea Sini Thesis
Andrea Sini Thesis
ย 
architectural design
 architectural design architectural design
architectural design
ย 
windows server installation procedure or
windows server installation procedure orwindows server installation procedure or
windows server installation procedure or
ย 
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
ย 
The UCLouvain Public Defense of my EMJD-DC Double Doctorate Ph.D. degree
The UCLouvain Public Defense of my EMJD-DC Double Doctorate Ph.D. degreeThe UCLouvain Public Defense of my EMJD-DC Double Doctorate Ph.D. degree
The UCLouvain Public Defense of my EMJD-DC Double Doctorate Ph.D. degree
ย 
Sdn
SdnSdn
Sdn
ย 
Public Seminar_Final 18112014
Public Seminar_Final 18112014Public Seminar_Final 18112014
Public Seminar_Final 18112014
ย 
CCCNP ROUTE v6_ch05
CCCNP ROUTE  v6_ch05CCCNP ROUTE  v6_ch05
CCCNP ROUTE v6_ch05
ย 
Diksha sda presentation
Diksha sda presentationDiksha sda presentation
Diksha sda presentation
ย 
WINSEM2023-24_BCSE429L_TH_CH2023240501528_Reference_Material_III_S3-Homoheter...
WINSEM2023-24_BCSE429L_TH_CH2023240501528_Reference_Material_III_S3-Homoheter...WINSEM2023-24_BCSE429L_TH_CH2023240501528_Reference_Material_III_S3-Homoheter...
WINSEM2023-24_BCSE429L_TH_CH2023240501528_Reference_Material_III_S3-Homoheter...
ย 
Automatic Ip Address Assignment on Network Topologies.pdf
Automatic Ip Address Assignment on Network Topologies.pdfAutomatic Ip Address Assignment on Network Topologies.pdf
Automatic Ip Address Assignment on Network Topologies.pdf
ย 
1Routing Basics.pdf
1Routing Basics.pdf1Routing Basics.pdf
1Routing Basics.pdf
ย 
06.CS2005-NetworkLayer-2021_22(1) (1).pptx
06.CS2005-NetworkLayer-2021_22(1) (1).pptx06.CS2005-NetworkLayer-2021_22(1) (1).pptx
06.CS2005-NetworkLayer-2021_22(1) (1).pptx
ย 

More from aida alsamawi

Lecture 1 - Introduction.pptx
Lecture 1 - Introduction.pptxLecture 1 - Introduction.pptx
Lecture 1 - Introduction.pptxaida alsamawi
ย 
Lecture 2 Part II Physical Layer Fundamentals.pptx
Lecture 2 Part II Physical Layer Fundamentals.pptxLecture 2 Part II Physical Layer Fundamentals.pptx
Lecture 2 Part II Physical Layer Fundamentals.pptxaida alsamawi
ย 
network design.pptx
network design.pptxnetwork design.pptx
network design.pptxaida alsamawi
ย 
network design 2.pptx
network design 2.pptxnetwork design 2.pptx
network design 2.pptxaida alsamawi
ย 
network design 5.pptx
network design 5.pptxnetwork design 5.pptx
network design 5.pptxaida alsamawi
ย 
network design 7.pptx
network design 7.pptxnetwork design 7.pptx
network design 7.pptxaida alsamawi
ย 
network design 3.pptx
network design 3.pptxnetwork design 3.pptx
network design 3.pptxaida alsamawi
ย 

More from aida alsamawi (7)

Lecture 1 - Introduction.pptx
Lecture 1 - Introduction.pptxLecture 1 - Introduction.pptx
Lecture 1 - Introduction.pptx
ย 
Lecture 2 Part II Physical Layer Fundamentals.pptx
Lecture 2 Part II Physical Layer Fundamentals.pptxLecture 2 Part II Physical Layer Fundamentals.pptx
Lecture 2 Part II Physical Layer Fundamentals.pptx
ย 
network design.pptx
network design.pptxnetwork design.pptx
network design.pptx
ย 
network design 2.pptx
network design 2.pptxnetwork design 2.pptx
network design 2.pptx
ย 
network design 5.pptx
network design 5.pptxnetwork design 5.pptx
network design 5.pptx
ย 
network design 7.pptx
network design 7.pptxnetwork design 7.pptx
network design 7.pptx
ย 
network design 3.pptx
network design 3.pptxnetwork design 3.pptx
network design 3.pptx
ย 

Recently uploaded

Top Rated Call Girls In chittoor ๐Ÿ“ฑ {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor ๐Ÿ“ฑ {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor ๐Ÿ“ฑ {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor ๐Ÿ“ฑ {7001035870} VIP Escorts chittoordharasingh5698
ย 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7Call Girls in Nagpur High Profile Call Girls
ย 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
ย 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
ย 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...tanu pandey
ย 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
ย 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
ย 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
ย 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
ย 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
ย 
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
ย 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
ย 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
ย 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
ย 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
ย 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .DerechoLaboralIndivi
ย 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfrs7054576148
ย 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
ย 

Recently uploaded (20)

Top Rated Call Girls In chittoor ๐Ÿ“ฑ {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor ๐Ÿ“ฑ {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor ๐Ÿ“ฑ {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor ๐Ÿ“ฑ {7001035870} VIP Escorts chittoor
ย 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
ย 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
ย 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
ย 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
ย 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
ย 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ย 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
ย 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
ย 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ย 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
ย 
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
ย 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
ย 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
ย 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ย 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
ย 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
ย 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
ย 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdf
ย 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
ย 

network design 8.pptx

  • 2. Addressing and Routing Architecture โ€ข Objectives โ€ข Background โ€ข Addressing Mechanisms โ€ข Routing Mechanisms โ€ข Addressing Strategies โ€ข Routing Strategies โ€ข Architectural Considerations
  • 3. Addressing and Routing Architecture Addressing Mechanisms โ€ข Classful Addressing โ€ข Subnetting โ€ข Variable-Length Subnetting โ€ข Supernetting โ€ข Private Addressing and NAT
  • 4. Addressing and Routing Architecture Addressing Mechanisms Private Addressing and NAT โ€ข Private IP addresses are those that cannot be advertised and forwarded by network devices in the public domain. โ€ข This was originally established to help with address space depletion in the Internet, for if networks that would normally be allocated public address space instead use private address space, those public addresses would remain available.
  • 5. Addressing and Routing Architecture Addressing Mechanisms Private Addressing and NAT There is a side benefit of using private addresses. ๏ƒ˜ It turns out that because these addresses are not advertised and forwarded in the Internet, they have an additional degree of security. โ€ข NAT maps IP addresses between public and private spaces. โ€ข In translating between public and private address spaces, NAT creates bindings between addresses. โ€ข These can be one-to-one address bindings (known as static NAT), one-to-many address bindings (known as dynamic NAT), and address and port bindings (known as network address port translation, or NAPT). โ€ข Often combinations of static, dynamic, and NAPT bindings are used in a network. For example, dynamic NAT is often used for user devices, and static NAT for servers.
  • 6. Addressing and Routing Architecture Routing Mechanisms โ€ข Establishing Routing Flows โ€ข Identifying and Classifying Routing Boundaries โ€ข Manipulating Routing Flows
  • 7. Addressing and Routing Architecture Routing Mechanisms Establishing Routing Flows โ€ข In preparing to discuss boundaries and route manipulation, we want to understand how flows will likely be routed through the network. โ€ข Determining routing flows begins with the flow analysis process. โ€ข Functional areas (FA) are groups within the system that share a similar function. โ€ข Groups may be of users (workgroups), applications, devices, or combinations of these, and they may share similar jobs/tasks, physical locations, or functions within the network (e.g., backbone routing). โ€ข Workgroups (WG) are groups of users that have common locations, applications, and requirements, or that belong to the same organization.
  • 8. Addressing and Routing Architecture Routing Mechanisms Establishing Routing Flows โ€ข The purpose of functional areas is to simplify the routing architecture. They can cross physical boundaries, such as rooms, floors, and buildings. A workgroup is similar to a functional area, but one level lower in hierarchy. โ€ข Consider Figure 6.12. In this figure there are multiple workgroups, in this case based on organizations within a company. Functional areas are created: the Scientists and Accounting groups in Building C, the two Management workgroups in Building B, the Scientists groups across Buildings A and C, and the backbone between the buildings. Notice that functional areas are connected with routers.
  • 9. Addressing and Routing Architecture Routing Mechanisms Establishing Routing Flows
  • 10. Addressing and Routing Architecture Routing Mechanisms Identifying and Classifying Routing Boundaries โ€ข Routing boundaries are physical or logical separations of a network, based on requirements for or administration of that network. โ€ข Physical boundaries can be identified by isolation LANs or demilitarized zones (DMZs); physical interfaces on network equipment; or physical security. โ€ข Logical boundaries can be identified by functional areas, workgroups, administrative domains, such as autonomous systems (ASs), and routing management domains.
  • 11. Addressing and Routing Architecture Routing Mechanisms Identifying and Classifying Routing Boundaries
  • 12. Addressing and Routing Architecture Routing Mechanisms Identifying and Classifying Routing Boundaries
  • 13. Addressing and Routing Architecture Routing Mechanisms Identifying and Classifying Routing Boundaries
  • 14. Addressing and Routing Architecture Routing Mechanisms Manipulating Routing Flows โ€ข Manipulating (i.e., controlling) routing flows within the network is vital to the proper operation and performance of the network. โ€ข The right combination of addressing and routing is important in this process, to localize routing flows whenever possible. โ€ข There are several techniques for manipulating routing flows at hard and soft boundaries. โ€ข A default route is the route used when there is no other route for that destination.
  • 15. Addressing and Routing Architecture Routing Mechanisms Manipulating Routing Flows โ€ข Route filtering is the technique of applying route filters to hide networks from the rest of an AS, or to add, delete, or modify routes in the routing table. โ€ข A route filter is a statement, configured in one or more routers, that identifies one or more IP parameters (e.g., an IP source or destination address) and an action (e.g., drop or forward) to be taken when traffic matches these parameters. โ€ข Route aggregation is the technique exchanging of routing information between ASs, usually between service providers with transit networks, and between large customer networks.
  • 16. Addressing and Routing Architecture Routing Mechanisms Manipulating Routing Flows โ€ข Policies are higher-level abstractions of the route filter technique described previously. Just as a route filter takes an action (e.g., drop, accept, modify) on traffic that matches one or more parameters (e.g., IP addresses), a policy takes a similar action on traffic that matches one or more AS parameters (e.g., AS number or list of AS numbers and metrics, time of day, cost).
  • 17. Addressing and Routing Architecture Routing Mechanisms Manipulating Routing Flows
  • 18. Addressing and Routing Architecture Routing Mechanisms Manipulating Routing Flows
  • 19. Addressing and Routing Architecture Routing Mechanisms Manipulating Routing Flows
  • 20. Addressing and Routing Architecture Addressing Strategies โ€ข During the requirements analysis process, it is important to gather information about device growth expectations, so that you can avoid having to change addressing schemes and reconfigure device addresses during the life cycle of the network. โ€ข When applying subnetting, variable-length subnetting, classful addressing, supernetting, private addressing and NAT, and dynamic addressing, we want to make sure that our network addresses and masks will scale to the sizes of the areas they will be assigned to. We also want to establish the degrees of hierarchy in the network.
  • 21. Addressing and Routing Architecture Addressing Strategies To scale the network addressing, we will use the numbers of ๏ƒ˜ Functional areas within the network ๏ƒ˜ Workgroups within each functional area ๏ƒ˜ Subnets within each workgroup ๏ƒ˜ Total numbers of subnets (current and future) in the organization ๏ƒ˜ Total numbers of devices (current and future) within each subnet
  • 22. Addressing and Routing Architecture Addressing Strategies
  • 23. Addressing and Routing Architecture Addressing Strategies
  • 24. Addressing and Routing Architecture Addressing Strategies
  • 25. Addressing and Routing Architecture Routing Strategies โ€ข Evaluating Routing Protocols โ€ข Choosing and Applying Routing Protocols
  • 26. Addressing and Routing Architecture Routing Strategies Evaluating Routing Protocols โ€ข Now we briefly examine and compare some popular IGPs and EGP: ๏ƒ˜ The routing information protocol (RIP and RIPv2) ๏ƒ˜ The open shortest-path first (OSPF) routing protocol ๏ƒ˜ The border gateway protocol version 4 (BGPv4) โ€ข We also consider the limited use of static routes in the network. ๏ƒ˜ Static routes are routes that are configured manually, by network personnel or scripts, in network devices, and that do not change until manually deleted or modified.
  • 27. Addressing and Routing Architecture Routing Strategies Evaluating Routing Protocols โ€ข A stub network is a network with only one path into or out of it, as in Figure 6.23.
  • 28. Addressing and Routing Architecture Routing Strategies Evaluating Routing Protocols โ€ข RIP and RIPv2 are IGPs that are based on a distance-vector routing algorithm. โ€ข This implies some characteristics of the dynamic behavior of RIP/RIPv2- routed networks. RIP and, to a lesser degree, RIPv2 are relatively straightforward to implement and maintain. โ€ข RIP/RIPv2 should be considered when there is low to medium hierarchy and diversity in the network. Degrees of hierarchy and diversity are shown in Figure 6.24.
  • 29. Addressing and Routing Architecture Routing Strategies Evaluating Routing Protocols
  • 30. Addressing and Routing Architecture Routing Strategies Evaluating Routing Protocols โ€ข OSPF is an IGP that is based on a link-state algorithm. Like RIP/RIPv2, the choice of routing algorithm affects the characteristics of the protocol. โ€ข In the case of OSPF, the use of a link-state algorithm results in a faster convergence time when changes in the routing topology occur. โ€ข OSPF also supports an area abstraction, which provides a hierarchy for routing information. โ€ข OSPF should be considered when there is high hierarchy and diversity in the network, as shown in Figure 6.24.
  • 31. Addressing and Routing Architecture Routing Strategies Evaluating Routing Protocols
  • 32. Addressing and Routing Architecture Routing Strategies Evaluating Routing Protocols โ€ข BGPv4 (or BGP) is a path-vector-based EGP. A path-vector algorithm is similar to a distance-vector algorithm, such as that used in RIP; however, it operates on ASs or lists of ASs (paths). In addition, BGP can use policies to determine actions to be taken on paths. โ€ข BGP exchanges routing information by establishing peering connections using TCP with a user-defined list. BGP is used to enforce network transport policies for an AS, such as allowing all routes from a certain AS to use this AS as a transit route; rejecting all routes that have been learned from a certain AS; and only announcing certain routes from this AS to other peers.
  • 33. Addressing and Routing Architecture Routing Strategies Evaluating Routing Protocols โ€ข BGP operates between ASs, yet there may be a number of routers (termed border routers) that connect to external networks. As such, there needs to be a mechanism for border routers from the same AS to communicate path information, so that it can be passed to multiple ASs (see Figure 6.25). โ€ข Therefore, there are two types of BGP: ๏ƒ˜ external BGP and internal BGP. External BGP (eBGP) is the โ€œnormalโ€ operational mode of BGP: passing path information between ASs. ๏ƒ˜ Internal BGP (iBGP) is used to form tunnels between border routers within an AS, in order to pass path information across that AS.
  • 34. Addressing and Routing Architecture Routing Strategies Evaluating Routing Protocols
  • 35. Addressing and Routing Architecture Routing Strategies Choosing and Applying Routing Protocols Some recommendations for choosing and applying routing protocols for your network. 1. Minimize the number of routing protocols used in the network. Two should be the maximum number of protocols allowed, with only one IGP. 2. Start with the simplest routing strategy and routing mechanism/protocol. 3. As the complexity in routing and choices of routing protocols increase, reevaluate the previous decisions.
  • 36. Addressing and Routing Architecture Routing Strategies Choosing and Applying Routing Protocols โ€ข Starting with the simplest routing mechanism (static routes) and working our way up to more complex mechanisms, we usually start with the outer edges of the network, where hierarchy and diversity are lowest, and work our way toward the center, or backbone, of the network, where hierarchy and diversity are highest (Figure 6.26).
  • 37. Addressing and Routing Architecture Routing Strategies Choosing and Applying Routing Protocols
  • 38. Addressing and Routing Architecture Routing Strategies Choosing and Applying Routing Protocols โ€ข In applying routing protocols we start by evaluating the degrees of hierarchy and diversity of each functional area and considering any other factors for that functional area or features of the routing protocols that may apply. โ€ข When a change is made in the choice of routing protocol, such as from static routes to RIP/RIPv2, from RIP/RIPv2 to OSPF, or from RIP/RIPv2/OSPF to BGP, โ€ข We need to reevaluate functional areas where routing protocols or static routes have already been chosen. โ€ข In general, RIP/RIPv2 supersedes static routes, and OSPF supersedes RIP/RIPv2. But remember that you can also consider combining the protocols within the network. Figure 6.27 illustrates the process of applying routing protocols.
  • 39. Addressing and Routing Architecture Routing Strategies Choosing and Applying Routing Protocols
  • 40. Addressing and Routing Architecture Architectural Considerations โ€ข Internal Relationships โ€ข External Relationships
  • 41. Addressing and Routing Architecture Architectural Considerations Internal Relationships โ€ข Depending on the type of network being developed, the set of candidate addressing and forwarding mechanisms for a component architecture can be quite different. โ€ข Two types of interactions are predominant within this component architecture: ๏ƒ˜ Trade-offs between addressing and forwarding mechanisms ๏ƒ˜ Trade-offs within addressing or within forwarding.
  • 42. Addressing and Routing Architecture Architectural Considerations Internal Relationships
  • 43. Addressing and Routing Architecture Architectural Considerations External Relationships โ€ข External relationships are trade-offs, dependencies, and constraints between the addressing/routing architecture and each of the other component architectures (network management, performance, security, and any other component architectures you may develop). โ€ข There are common external relationships between addressing/ routing and each of the other component architectures
  • 44. Addressing and Routing Architecture Architectural Considerations External Relationships Some of common external relationships between addressing/ routing and each of the other component architectures ๏ƒ˜ Interactions between addressing/routing and network management. ๏ƒ˜ Interactions between addressing/routing and performance. ๏ƒ˜ Interactions between addressing/routing and security.