SIMULATION OF LOCAL AREA COMPUTER NETWORKS WITH DISTANCE-VECTOR ROUTING PROTOCOLS FOR THE NEEDS OF THE PRIVATE COMPANY

SIMULATION OF LOCAL AREA COMPUTER NETWORKS WITH DISTANCE-VECTOR ROUTING PROTOCOLS FOR THE NEEDS OF THE PRIVATE COMPANY

Authors

  • Petar Boyanov DEPARTMENT OF MANAGEMENT OF SECURITY SYSTEMS, FACULTY OF TECHNICAL SCIENCES, KONSTANTIN PRESLAVSKY UNIVERSITY OF SHUMEN, SHUMEN 9712,115, UNIVERSITETSKA STR.

DOI:

https://doi.org/10.46687/jsar.v18i1.283

Keywords:

Computer and network administrators, Computer resources, LAN, Optics, Protocols, Security, Simulation, WAN

Abstract

In this paper a simulation of local area computer networks for the needs of the private company is made.

Author Biography

Petar Boyanov, DEPARTMENT OF MANAGEMENT OF SECURITY SYSTEMS, FACULTY OF TECHNICAL SCIENCES, KONSTANTIN PRESLAVSKY UNIVERSITY OF SHUMEN, SHUMEN 9712,115, UNIVERSITETSKA STR.

DEPARTMENT OF MANAGEMENT OF SECURITY SYSTEMS, FACULTY OF TECHNICAL SCIENCES, KONSTANTIN PRESLAVSKY UNIVERSITY OF SHUMEN, SHUMEN 9712,115, UNIVERSITETSKA STR.

ORCID iD icon https://orcid.org/0000-0003-3668-6713

References

Ahmedova D., Konstantinova E., Tsankov Ts. The use of packet sniffing tools in computer networks security. International Scientific Conference “Defense Technologies” DefTech 2020, Faculty of Artillery, Air Defense and Communication and Information Systems, Shumen, 2020, ISSN 2367-7902, pp. 401-406.

Boyanov, P., Designing a small corporate building with four working computer departments using distance vector routing protocol - RIP, a refereed Journal Scientific and Applied Research (Licensed in EBSCO, USA), Konstantin Preslavsky University Press, ISSN 1314-6289, vol. 7, 2015, pp. 52-61.

Boyanov, P., Implementation of the network vulnerability scanner Armitage for security weaknesses detection in the computer network and systems. A refereed Journal Scientific and Applied Research, Konstantin Preslavsky University Press, 2019, 15, 47-54, ISSN 1314-6289, EBSCO, Google Schloar and Web of Science.

Boyanov, P., Educational exploiting the information resources and invading the security mechanisms of the operating system Windows 7 with the exploit Eternalblue and backdoor Doublepulsar, a refereed Journal Scientific and Applied Research (Licensed in EBSCO, USA), Konstantin Preslavsky University Press, ISSN 1314-6289, vol. 14, 2018, pp.34-41.

Boyanov, P., Stoyanov St., Hristov, Hr., Fetfov, O., Trifonov, T., Security routing simulation the local area network of academic departments using a link-state routing protocol – OSPF, a refereed Journal Scientific and Applied Research (Licensed in EBSCO, USA), Konstantin Preslavsky University Press, ISSN 1314-6289, vol. 11, 2017, pp. 47-58.

Boyanov, P., Stoyanov St., Hristov, Hr., Fetfov, O., Trifonov, T., Routing information security in the local area network of academic departments using an enhanced distance vector routing protocol - EIGRP, a refereed Journal Scientific and Applied Research (Licensed in EBSCO, USA), Konstantin Preslavsky University Press, ISSN 1314-6289, vol. 11, 2017, pp. 35-46.

Getzov, P., Stoyanov, St., Boyanov, P., Research of the transparency characteristics of the atmosphere which influence the flight control of flying machines, a refereed Journal Scientific and Applied Research (Licensed in EBSCO, USA), Konstantin Preslavsky University Press, ISSN 1314-6289, vol. 11, 2017, pp. 5-9.

Hinds, Alex, Anthony Atojoko, and Shao Ying Zhu. “Evaluation of OSPF and EIGRP routing protocols for ipv6.” International Journal of Future Computer and Communication 2.4 (2013): 287.

Islam, Mohammad Nazrul. Simulation based EIGRP over OSPF performance analysis. Diss. Blekinge Institute of Technology, 2010.

Knight, Steven, D. Weaver, D. Whipple, R. Hinden, D. Mitzel, P. Hunt, P. Higginson, M. Shand, and A. Lindem. “Virtual router redundancy protocol.” RFC2338, April (1998).

Konstantinova E., Tsankov Ts. Analyzing security threats in smart homes technology. International Scientific Conference “Defense Technologies” DefTech 2020, Faculty of Artillery, Air Defense and Communication and Information Systems, Shumen, 2020, ISSN 2367-7902, pp. 373-378.

Konstantinova E., Tsankov Ts. Capabilities for high-speed data transmission through the use of visible light. International Scientific Conference “Defense Technologies” DefTech 2020, Faculty of Artillery, Air Defense and Communication and Information Systems, Shumen, 2020, ISSN 2367-7902, pp. 379-385.

Krishnan, Y. Navaneeth; SHOBHA, G. Performance analysis of OSPF and EIGRP routing protocols for greener internetworking. In: Green High Performance Computing (ICGHPC), 2013 IEEE International Conference on. IEEE, 2013. p. 1-4.

Lemma, Esuendale Shewandagn. Performance Comparison of EIGRP/IS-IS and OSPF/IS-IS. Diss. Blekinge Institute of Technology, 2009.

Lin-Zhu, Wang, Fang Ya-qin, and Shan Min. “Performance comparison of two routing protocols for ad hoc networks.” In Information Engineering, 2009. ICIE’09. WASE International Conference on, vol. 1. IEEE, 2009.

Mogul, Jeffrey. “Internet standard subnetting procedure.” (1985).

Munetomo, Masaharu, Yoshiaki Takai, and Yoshiharu Sato. “A migration scheme for the genetic adaptive routing algorithm.” In Systems, Man, and Cybernetics, 1998. 1998 IEEE International Conference on, vol. 3, pp. 2774-2779. IEEE, 1998.

Narvaez, Paolo. “Routing reconfiguration in IP networks.” (2000).

Ogletree, Terry William, ed. Upgrading and repairing networks. Que Publishing, 2004.

Pepelnjak, Iv., EIGRP network design solutions. Cisco Press, 1999.

Piscitello D., Chapin L, “Open Systems Networking TCP/IP and OSI”, Addison-Wesley, Reading, MA, 1993 г.

Rakheja, Pankaj, Prabhjot kaur, Anjali gupta, Aditi Sharma,“Performance Analysis of RIP, OSPF, IGRP and EIGRP Routing Protocols in a Network”. International Journal of Computer Applications (IJCA) ISSN: 0975-8887.

Scheideler, Christian, and Berthold Vöcking. “From static to dynamic routing: Efficient transformations of store-and-forward protocols.” SIAM journal on Computing 30, no. 4 (2000): 1126-1155.

Simian, Corina, and VladislavGeorgiev. “Practical aspects regarding network monitoring.” In Proceedings of the 8th conference on Simulation, odeling and optimization, pp. 204-207. World Scientific and Engineering Academy and Society (WSEAS), 2008.

SO-IN, Chakchai. A Survey of Network Traffic Monitoring and Analysis Tools. Cse 576m computer system analysis project, Washington University in St. Louis, 2009.

Song, Yuqian, et al. Towards a framework to support novice users in understanding and monitoring of Home Area Networks. In: Pervasive Computing and Communications Workshops (PERCOM Workshops), 2012 IEEE International Conference on. IEEE, 2012. p. 82-87.

Vetriselvan, V., Pravin R. Patil, and M. Mahendran. “Survey on the RIP, OSPF, EIGRP Routing Protocols.” IJCSIT) International Journal of Computer Science and Information Technologies 5.2 (2014): 1058-1065.

Waitzman, David, S. E. Deering, and Craig Partridge. “Distance vector multicast routing protocol.” (1988).

Wegner, J. D., Robert Rockell, and Cameron Brandon. IP addressing and subnetting including Ipv6. Syngress Media, 2000.

WIJAYA, Chandra. Performance analysis of dynamic routing protocol EIGRP and OSPF in Ipv4 and Ipv6 network. In: Informatics and Computational Intelligence (ICI), 2011 First International Conference on. IEEE, 2011. p. 355-360.

Wu, Bing. “Simulation based performance analyses on RIPv2, EIGRP, and OSPF Using OPNET” (2011).

Xu, Don, and Ljiljana Trajkovic. “Performance analysis of RIP, EIGRP, and OSPF using OPNET.” (2011).

Downloads

Published

23.03.2023

How to Cite

Boyanov, P. (2023). SIMULATION OF LOCAL AREA COMPUTER NETWORKS WITH DISTANCE-VECTOR ROUTING PROTOCOLS FOR THE NEEDS OF THE PRIVATE COMPANY: SIMULATION OF LOCAL AREA COMPUTER NETWORKS WITH DISTANCE-VECTOR ROUTING PROTOCOLS FOR THE NEEDS OF THE PRIVATE COMPANY. JOURNAL SCIENTIFIC AND APPLIED RESEARCH, 18(1), 83–93. https://doi.org/10.46687/jsar.v18i1.283

Most read articles by the same author(s)

1 2 3 4 5 6 7 8 > >>