Recently, the Internet relies on a core suite of IP routing protocols. This paper examines the characteristics of important routing protocols in a performance network. Any router in the network needs help with routing protocols. Those deferred types of routing protocols used in networks such as Interior Gateway Routing Protocol (IGRP), Open Shortest Path First (OSPF), Enhanced Interior Gateway Routing Protocol (EIGRP), and Routing Information Protocol (RIP). All transmitted data through the internet between the source and the destination need to be routed using one of the routing protocols. Choosing the appropriate routing protocol by scanning protocols depends on the type of network applications and a number of parameters (i.e. traffic sent and traffic received). In addition, this paper presents advances in routing technology that highlight the difference between RIP, OSPF, IGRP and EIGRP in terms of metrics and other technical aspects. In this survey, networks rely on different types of routing protocols and studies the packets end to end delay, convergence time on flapping links and the average point to point throughput (bit/sec).
Man-in-the-middle (MitM) attacks became one of the most risk attacks on OpenFlow communication channel in software-defined networking, its detection is a very hard task due there is no authentication in OpenFlow protocol. This channel is the most important in the network and is responsible for sending the control commands from the controller to the switches, so once the OpenFlow channel is hacked, the entire network is controlled by the attacker. Therefore, we propose a complementary solution to transport layer security protocol to detect man-in-the-middle attacks based on hybrid quantum-classical protocol. Based on the hybrid protocol, an easy-toimplement authentication between controller and switches depends on quantum and classical security layers. Also, detect eavesdropping on channel depending on quantum parameters. In this paper, we implement a simulation of hybrid protocol using a software-defined networking emulator for monitoring the OpenFlow channel to detect attacks, and the results showed the ease of detecting the eavesdrop and verifying the authentication of the other party with a hybrid method to get a high level of authentication.
In the WiMAX (Worldwide interoperability for Microwave Access) the standard based on two modes: fixed and mobile, this provides wireless broadband to fixed and mobile terminals. WiMAX is an enhanced approach of wireless broadband. This paper focus on comparing between two networking approach Fixed and mobile terminal considering a video and voice over IP(VOIP) technology. It is using signal video with VOIP. to study similarity and difference in performance delay, load and Throughput in both fixed and mobile WiMAX.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.