If you're unsure I would probably go with EIGRP. Unless you are sure that your organization will be growing rapidly and you will eventually have a fairly large network. EIGRP is a little easier to configure, but OSPF is generally considered to be more scalable. Also, if you ever buy a non Cisco router, EIGRP won't work with it, although you can always redistribute to other protocols.
If you choose OSPF, I would definitely recommend reading up on it and doing plenty of practice with it. It can be quite tricky with its many different types of areas and such. Also, I hope somebody will correct me if I'm wrong here, but I believe EIGRP converges a little faster than OSPF, although there is not a huge difference like there would be when compared to RIP, for example. OSPF also requires more CPU utlization than some other protocols, although with your current setup, it sounds like that probably won't be much of an issue. Just something to consider as you grow.
I hope I made at least SOME sense here. Good luck.
I don't think you need routing protocol to implement more VLANs, that's the idea of creating VLAN, try to eliminate layer 3 device such as router, unless for inter VLAN communication then you need layer 3 device, in this case than you need router that support ISL(inter-switch link) routing or you can use router that has 2 or 3 fastethernet connection and connect each vlan to these interfaces.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...