This paper is published in Volume-2, Issue-6, 2016
Area
Networking
Author
Vikasdeep Kaur, Harpreet Kaur, Jaspreet Kaur
Org/Univ
Bahra Group of Institute, Patiala, Punjab, India
Pub. Date
12 November, 2016
Paper ID
V2I6-1145
Publisher
Keywords
MPLS, ISIS, OSPF, Dijkstra’s Shortest Path algorithm, BGP, EIGRP, VPN.

Citationsacebook

IEEE
Vikasdeep Kaur, Harpreet Kaur, Jaspreet Kaur. Behavior Analysis of OSPF and ISIS Routing Protocols with Service Provider Network, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
Vikasdeep Kaur, Harpreet Kaur, Jaspreet Kaur (2016). Behavior Analysis of OSPF and ISIS Routing Protocols with Service Provider Network. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.IJARIIT.com.

MLA
Vikasdeep Kaur, Harpreet Kaur, Jaspreet Kaur. "Behavior Analysis of OSPF and ISIS Routing Protocols with Service Provider Network." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.IJARIIT.com.

Abstract

OSPF is mainly designed for IP networks from scratch and runs in almost all sorts of environments like enterprise, data centers, or service providers, while ISIS, which was mainly designed by ISO was not intended to run for IP based networks from scratch and IETF in the early 1990’s adopted ISIS for its advantages. As a scalability purpose ISIS is better than OSPF, but when we have a large database or a large service provider, with only a single level design inside the service provider Both the routing protocols have different authentication mechanisms with ISIS providing key chain based mechanism and provides both plain-text and MD5 based integration with it, while OSPF also provide MD5 and SHA1 hashing based authentication when used with IPv6. Multiprotocol label switching technology (MPLS) is used to transfer the data in service provider network. Apart from Interconnecting Data Centers, L2VPNs are also used for Inter-AS service provider’s connectivity and connecting various Enterprise Branch offices with each other. Selection of right L2VPN technology is very important as wrong technology can harm the network. The main focus of this technique to give the solutions for slow speed, quality of service, lack of traffic engineer, less security and problem in trouble shouting. The motive is to improve the speed, high security, easily trouble shoot, high quality in terms of packet transformation and better results for traffic engineering.