Solved

Eigrp versus OSPF in a ring topology

Posted on 2016-11-02
3
146 Views
Last Modified: 2016-11-06
I have a ring topology scenario and I was thinking of implementing EIGRP as the dynamic routing protocol. But thinking about the EIGRP queries, I am not sure if it is a good fit for the ring. I am not an expert with OSPF but will it  a be a better fit. I currently have 10 nodes within my ring. Any thoughts will be greatly appreciated.
0
Comment
Question by:leblanc
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 30

Accepted Solution

by:
Predrag earned 500 total points
ID: 41871543
If you create summary address on every interface between those 10 nodes there should not be any problems with queries. So, if you plan IP address ranges carefully you will be able to summarize whole location in one summary. In the case of EIGRP IP address summarization is not only reducing size of routing table, but it is also most efficient way to resolve queries (in this case you will not have problems with queries).

On the other hand OSPF is not proprietary protocol and if needed you can mix vendors (this would be the reason to go for OSPF rather than EIGRP in the first place), but you can summarize only on ABRs.
Did you check are your device licenses support routing?

Every protocol have pros and cons.
0
 
LVL 1

Author Comment

by:leblanc
ID: 41872201
The licenses are all good for advanced routing. Yes. I was thinking of summarization as well. Thx Predrag.
0
 
LVL 30

Expert Comment

by:Predrag
ID: 41872252
You're welcome.
0

Featured Post

NEW Veeam Agent for Microsoft Windows

Backup and recover physical and cloud-based servers and workstations, as well as endpoint devices that belong to remote users. Avoid downtime and data loss quickly and easily for Windows-based physical or public cloud-based workloads!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
WARNING:   If you follow the instructions here, you will wipe out your VTP and VLAN configurations.  Make sure you have backed up your switch!!! I recently had some issues with a few low-end Cisco routers (RV325) and I opened a case with Cisco TA…
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Suggested Courses

626 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question