Unit 5 - Classifications of MAC Protocols - Classifications of Routing Protocols - Classifications of Transport Layer Protocols
Unit 5 - Classifications of MAC Protocols - Classifications of Routing Protocols - Classifications of Transport Layer Protocols
MAC protocol is the first protocol layer above the Physical Layer in ad hoc .The primary
task of any MAC protocol is to control the access of the nodes to shared medium.
1. Path Vector:
Dynamic routing protocols use metric, cost, and hop count to identify the best path
from the path available for the destination network.
Advantages –
As it maintains separate tables for both the best route and the backup routes ( whole
topology) therefore it has more knowledge of the internetwork than any other
distance vector routing protocol.
Concept of triggered updates is used therefore no more unnecessary bandwidth
consumption is seen like in distance vector routing protocol.
Partial updates are triggered when there is a topology change, not a full update like
distance vector routing protocol where the whole routing table is exchanged.
Adjacent IP addresses
Router designation
Path distance
Origin type
The BGP Best Path Selection Algorithm is utilized to determine the optimal paths for data packet
transfers. If no special parameters have been configured, BGP will select routes with the shortest
path to the destination.
BGP enables administrators to modify transfer routes based on their requirements and provides
extensive security measures to ensure that only authorized routers can exchange data and
information. The algorithm for selecting the optimal route path can be modified by modifying
the BGP cost community attribute. BGP is able to make routing decisions based on factors
including weight, local preference, locally generated, AS Path length, origin type, multi-exit
discriminator, eBGP over iBGP, IGP metric, router ID, cluster list, and neighbor IP address.
BGP only transmits updated routing table data when a change occurs. Therefore, there is no
auto-discovery of topology changes, and the user must manually set up BGP. Regarding security,
the BGP protocol can be verified so that only authorized routers can exchange data.
BGP was chosen over OSPF because BGP allows device designers and owners greater flexibility
and control than OSPF. BGP processes include options for which routes should be broadcast and
which alerts the device will accept. It provides extra options for route choosing. This allows us
greater flexibility to avoid overloading specific lines that OSPF would automatically presume to
be the fastest path.
In 1993, RIPv1 evolved into RIP version 2, a classless routing protocol (RIPv2). RIPv2
brought the subsequent enhancements:
OSPFv3 now supports both IPv4 and IPv6 thanks to the Address Families functionality.
OSPF implements the link state routing algorithm and is utilized in medium- to large-sized
networks. OSPF is an intradomain routing protocol that only operates within a specific routing
domain. OSPF is also a hierarchical routing protocol that may be used in a single autonomous
system. OSPF emerged from the intermediate-system-to-system (IS-IS) routing protocol of the
Open Systems Interconnection (OSI) reference model. OSPF enables multipath routing and
uses one or more routing metrics, including dependability, bandwidth, latency, load, and
maximum transmission unit (MTU). If OSPF utilizes many metrics, it also allows type-of-
service (TOS) requests for traffic differentiation.
OSPF, is a link-state, interior gateway, and classless protocol that uses the shortest path first
(SPF) algorithm to ensure efficient data transmission. Internally, this type maintains numerous
databases containing topology tables and network-wide information. Typically, the data is
derived from link state advertising transmitted by individual routers. The advertising, which
resembles reports, provides thorough details of the path's length and the resources that may be
necessary.
OSPF utilizes the Dijkstra algorithm to recalculate paths when topology changes occur. It also
employs authentication procedures to maintain the security of its data throughout network
modifications and intrusions. Due to its scalability, OSPF may be advantageous for both small
and large network enterprises.
Classifications of Transport Layer Protocols