Loading

Is-Is Protocol Model Suite: Simulation of Implemented Features and Their Configuration
Arif Sari1, Joshua Chibuike Sopuru2, ÖnderOnursal3

1Arif Sari, Department of Management Information systems The American University, Cyprus.
2Joshua Chibuike Sopuru, Department of Management Information systems The American University, Cyprus.
3ÖnderOnursal, Department of Management Information systems The American University, Cyprus.
Manuscript received on 01 June 2019 | Revised Manuscript received on 07 June 2019 | Manuscript published on 30 June 2019 | PP: 2014-2022 | Volume-8 Issue-8, June 2019 | Retrieval Number: G6290058719/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In recent times, the Intermediate System to Intermediate System (IS-IS) protocol gains more attention from network administrators and users alike. As many service providers engage in the active usage of this protocol, the IS-IS protocol has unfolded a new stream of research regarding its applicability in different scenarios. In contrast to existing distance vector protocols, the IS-IS In basic terms is a link state protocol (LSP) supporting extremely large networks. It is also known for its robustness and an easily adaptable protocol powering cutting edge technologies like the Multiprotocol Label Switching (MPLS), a system used for traffic engineering. A major reason in considering wide application of the IS-IS protocol is its ability to efficiently move large chunk of data within group of connected computers or within a network(area) and still achieving best route for data delivery. Because of the ability of the Optimized Network Engineering Tool (OPNET) to effectively study the internal operations of a simulated network, we conducted experiments using OPNET to demonstrate various implemented features of IS-IS and to explain their configuration.
Keyword: Their Configuration Multiprotocol Optimized Network Engineering.
Scope of the Article: Network Modelling and Simulation