期刊名称:International Journal of Computer Science and Information Technologies
电子版ISSN:0975-9646
出版年度:2014
卷号:5
期号:2
页码:1099-1102
出版社:TechScience Publications
摘要:The algorithm inculcates the use of dynamic – distance vector routing protocols such as RIP, RIPV2, IGRP, and EIGRP to determine the path. These routing protocols will determine the best path by analysing only the hop count. i.e. if a packet goes through a router it refers to one hop. So the least number of hop counts will be always considered as best path. In such case, those protocols will determine only the shortest path, but not the best path. The reason being on its ignorance of bandwidth (speed of transmitting the data) and clock rate(bits/sec) of the path in which the data has to travel, therefore wastage of time in routing and re-routing occurs. Standard Access Control List (Firewall of the router) which will deny an entire communication between the source and destination on the network. Here LINK STATE ROUTING (LSR) PROTOCOL i.e. OSPF, to determine the path is implemented. An OSPF routing protocol will determine the best path, especially by analysing the bandwidth & clock rate. It does not consider about the least number of hop counts. It will always choose only the path which is having highest bandwidth among the other paths and also to increase the routing and re-routing time. VLSM and DHCP on our networks, which will reduce the wastage of IP address and ignore the inactive hosts on the network to reduce the analysing time has brought into account. A new ACL (Firewall of the Router) which is Extended Access Control List (EACL) is developed. With the help of the new EACL Configuration we are able to deny or allow the communication on protocol basis which means if we require only HTTP Communication with the Destination Network we can deny the rest of the services like NFS, FTP, TELNET, SNMP, etc. So that the users from the destination network can view or access only the HTTP site, the users will be denied immediately if they try to access any of our other services (NFS, FTP, TELNET, SNMP).Hence utilization of bandwidth is efficient in the method.