Showing posts with label tutorial. Show all posts
Showing posts with label tutorial. Show all posts

Friday, October 28, 2016

OSPF routing between Cisco Router and Mikrotik Router

For this I have used GNS3 for cisco router and Virtual box for mikrotic router. Cisco router in GNS3 is connected to a host which is configured by my LAN card adapter. Mikrotic router  is connected to also LAN  by bridging in virtualbox.
GNS3 Settings

Virtual box setting
C

Cisco Router IP                                           Mikrotic Router IP
      G0/0: 192.168.0.60/24                                 ether1: 192.168.0.50/24
      loopback1: 2.2.2.2/24                                    loopback1:1.1.1.1/24
      ospf area 400                                                 ospf area id: 0.0.1.144
                                                                           
Area ID calculation in Mikrotic, convert 400 decimal into binary (i.e. 110010000). The binary number needs to show 32 digits, representing the digits of the 4 octets in the IP type format. So, 110010000 binary = 00000000.00000000.0000001.10010000 as broken into octets. Finally, convert each octet into a decimal value. (e.g. 00000000.00000000.0000001.10010000 = 0.0.1.144). Therefore, 400 = 0.0.1.144
Command in Cisco 
R1>ena
R1#conf t
R1(config)#int loopback 1
R1(config-if)#ip address 2.2.2.0 255.255.255.0
R1(config-if)#no shut
R1(config)#int G0/0 
R1(config-if)#ip address 192.168.1.0 255.255.255.0
R1(config-if)#no shut

R1(config)#router ospf 1
R1(config-router)#network 192.168.0.0 0.0.0.255 area 400
R1(config-router)#network 2.2.2.0 0.0.0.255 area 400
R1(config-router)#

Command in Mikrotic


[jahid@MikroTik] >
[jahid@MikroTik] > interface bridge add name=loopback1
[jahid@MikroTik] > ip address add address=1.1.1.1/24 interface=loopback1
[jahid@MikroTik] > ip address add address=192.168.0.50/30 interface=ether1
[jahid@MikroTik] >
[jahid@MikroTik] > routing ospf
[jahid@MikroTik] /routing ospf> area add name=area400 area-id=0.0.1.144
[jahid@MikroTik] /routing ospf> network add network=192.168.0.0/24 area=

Area ::= area1 | area2 | area5 | area400 | limon | ...

[jahid@MikroTik] /routing ospf> network add network=192.168.0.0/24 area=area400
[jahid@MikroTik] >
[jahid@MikroTik] >

Then Checking in cisco



Then Checking in Mikrotik






Thank you everybody. 





Friday, April 8, 2016

Security Attack

Types of attack:
There are five types of attack:

Passive Attack
 "Passive attack" is a attack where attacker attempts to learn information from the network to further attack but does not affect network resources. A passive attack monitors unencrypted traffic and looks for clear-text passwords and sensitive information that can be used in other types of attacks. Passive attacks include traffic analysis, monitoring of unprotected communications, decrypting weakly encrypted traffic, and capturing authentication information such as passwords. Passive interception of network operations enables adversaries to see upcoming actions. Passive attacks result in the disclosure of information or data files to an attacker without the consent or knowledge of the user.

Active Attack
"Active attack" is a attack where attacker attempts to alter system resources or affect their operation.In an active attack, the attacker tries to bypass or break into secured systems. This can be done through stealth, viruses, worms, or Trojan horses. Active attacks include attempts to circumvent or break protection features, to introduce malicious code, and to steal or modify information. These attacks are mounted against a network backbone, exploit information in transit, electronically penetrate an enclave, or attack an authorized remote user during an attempt to connect to an enclave. Active attacks result in the disclosure or dissemination of data files, DoS, or modification of data.

Distributed Attack
A distributed attack requires that the adversary introduce code, such as a Trojan horse or back-door program, to a “trusted” component or software that will later be distributed to many other companies and users Distribution attacks focus on the malicious modification of hardware or software at the factory or during distribution. These attacks introduce malicious code such as a back door to a product to gain unauthorized access to information or to a system function at a later date.

Insider Attack
An insider attack involves someone from the inside, such as a disgruntled employee, attacking the network Insider attacks can be malicious or no malicious. Malicious insiders intentionally eavesdrop, steal, or damage information; use information in a fraudulent manner; or deny access to other authorized users. No malicious attacks typically result from carelessness, lack of knowledge, or intentional circumvention of security for such reasons as performing a task

Close-in Attack
A close-in attack involves someone attempting to get physically close to network components, data, and systems in order to learn more about a network Close-in attacks consist of regular individuals attaining close physical proximity to networks, systems, or facilities for the purpose of modifying, gathering, or denying access to information. Close physical proximity is achieved through surreptitious entry into the network, open access, or both.
One popular form of close in attack is social engineering in a social engineering attack, the attacker compromises the network or system through social interaction with a person, through an e-mail message or phone. Various tricks can be used by the individual to revealing information about the security of company. The information that the victim reveals to the hacker would most likely be used in a subsequent attack to gain unauthorized access to a system or network.

Phishing Attack
In phishing attack the hacker creates a fake web site that looks exactly like a popular site such as the SBI bank or paypal. The phishing part of the attack is that the hacker then sends an e-mail message trying to trick the user into clicking a link that leads to the fake site. When the user attempts to log on with their account information, the hacker records the username and password and then tries that information on the real site.

Hijack attack
Hijack attack In a hijack attack, a hacker takes over a session between you and another individual and disconnects the other individual from the communication. You still believe that you are talking to the original party and may send private information to the hacker by accident.

Spoof attack
Spoof attack In a spoof attack, the hacker modifies the source address of the packets he or she is sending so that they appear to be coming from someone else. This may be an attempt to bypass your firewall rules.

Buffer overflow
Buffer overflow A buffer overflow attack is when the attacker sends more data to an application than is expected. A buffer overflow attack usually results in the attacker gaining administrative access to the system in a ommand prompt or shell.

Exploit attack
Exploit attack In this type of attack, the attacker knows of a security problem within an operating system or a piece of software and leverages that knowledge by exploiting the vulnerability.

Password attack
Password attack An attacker tries to crack the passwords stored in a network account database or a password-protected file. There are three major types of password attacks: a dictionary attack, a brute-force attack, and a hybrid attack. A dictionary attack uses a word list file, which is a list of potential passwords. A brute-force attack is when the attacker tries every possible combination of characters.

Brute force attack:  
Brute force attack is a term of attack which work by calculating every possible combination that could make up a password and apply it to see whether it is correct password or not. As the password’s length increases, the amount of time to find the correct password increases exponentially. Some common popular tools or software used for penetration testing are hydra, hydra-gtk, rainbowcrack, john the ripper etc.

Friday, March 25, 2016

AAA

What is AAA?

 Security for user access to the network and the ability to dynamically define a user’s profile to gain access to network resources is concerning issue in data communication environment. AAA network security services provide the primary framework through which a network administrator can set up access control on network which is usually the function of a router or access server. It is strongly recommended that network and administrative access security in the Cisco environment is based on a modular architecture that has three functional components: authentication, authorization and accounting.

Authentication:  Authentication is the way a user is identified prior to being allowed access to the network and network services. AAA authentication is configured by defining a named list of authentication methods, and then applying that list to various interfaces. The method list defines the types of authentication to be performed and the sequence in which they will be performed; it MUST be applied to a specific interface before any of the defined authentication methods will be performed. All authentication methods, except for local, line password, and enable authentication, MUST be defined through AAA.

Authorization:  Authorization provides the method for remote access control, including one-time authorization or authorization for each service, per-user account list and profile, user group support, Telnet etc.  AAA authorization works by assembling a set of attributes that describe what the user is authorized to perform. These attributes are compared to the information contained in a database for a given user and the result is returned to AAA to determine the user's actual capabilities and restrictions. The database can be located locally on the access server or router, or it can be hosted remotely on a RADIUS or TACACS+ security server.  As with authentication, AAA authorization is configured by defining a named list of authorization methods, and then applying that list to various interfaces.

Accounting: Accounting provides the method for collecting and sending security server information used for billing, auditing, and reporting - user identities, start and stop times, executed commands, number of packets, and number of bytes. Accounting enables tracking of the services users are accessing as well as the amount of network resources they are consuming. With AAA accounting activated, the NAS reports user activity to the RADIUS or TACACS+ security server in the form of accounting records. Each accounting record is comprised of accounting AV pairs and is stored on the access control server. This data can then be analyzed for network management, client billing, and/or auditing. All accounting methods must be defined through AAA. Accounting is configured by defining a named list of accounting methods, and then applying that list to various interfaces.




What is RADIUS?

 RADIUS is an access server that uses AAA protocol. It is a system of distributed security that secures remote access to networks and network services against unauthorized access. RADIUS comprises three components: a protocol with a frame format that utilizes User Datagram Protocol (UDP)/IP, server and client.
A network access server (NAS) operates as a client of RADIUS. The client is responsible for passing user information to designated RADIUS servers, and then acting on the response that is returned. RADIUS servers are responsible for receiving user connection requests, authenticating the user, and returning all configuration information necessary for the client to deliver service to the user. The RADIUS servers can act as proxy clients to other kinds of authentication servers.


Authentication and Authorization checking are bundled together. When the client device requests authentication from the server, the server replies with both authentication attributes and authorization attributes. These functions cannot be performed separately. The accounting features of the RADIUS protocol can be used independently of RADIUS authentication or authorization. RADIUS encrypts only the password in the access-request packet. The remainder of the packet is unencrypted.



What is TACACS+?

 TACACS+ stands for Terminal Access Control Access Control Server. TACACS+ is some enhancement to the TACACS application. The main goal of TACACS+ is to provide a centralized database against which to perform Authentication, Authorization, and Accounting (AAA).
TACACS+ uses a client server model approach. The server is questioned by the client and the server in turn reply by stating whether the user passed or failed the authentication. It is important to note that the client is not the user or the user's machine, but rather the device that is trying to determine if the user should be allowed entry into the network (typically a router or a firewall). TACACS+ uses TCP as the transport protocol –the default port is 49. If required, the server can be configured to listen on other ports. TACACS+ is similar to RADIUS (Remote Access Dial In User Server) with a few key differences.


All three AAA functions (authentication, authorization, and accounting) can be used independently. Therefore, one method such as Kerberos can be used for authentication, and a separate method such as TACACS+ can be used for authorization. While TACACS+ can use usernames and passwords it can also use other mechanisms such as "one time" passwords that prevent hackers from accessing system.
Both TACACS+ and RADIUS use a shared secret key to provide encryption. TACACS+ encrypts entire payload when communicating and the user's password between the client and the server. TACACS+ uses MD5 hash function in its encryption and decryption algorithm.

what is firewall, function and its types

                                                              Firewall 
What is Firewall?

A firewall acts as a shield to protect our system from the untrusted, non-reliable systems connected to the Internet. Conceptually, it derives from the barriers made of fire-resistant material- used to prevent the spread of fires. A firewall on your PC, however, listens to all ports on your system for any attempts to open a connection; when it detects such an attempt, it reacts according to a predefined set of rules. Put more technically, a firewall is a piece of software, hardware, or both, that allows only selected packets to pass from the Internet to your private network or system.



Describe the types of Firewall.

Answer: Several types of firewalls exist:

Packet filtering
The system examines each packet entering or leaving the network and accepts or rejects it based on user-defined rules. Packet filtering is fairly effective and transparent to users, but it is difficult to configure. In addition, it is susceptible to IP spoofing.


Advantages:

Simplicity

Transparency to users
High speed
Disadvantages:
Difficulty of setting up packet filter rules
Lack of Authentication

Circuit-level gateway implementation
 This process applies security mechanisms when a TCP or UDP connection is established. Once the connection has been made, packets can flow between the hosts without further checking.

Application-level Gateway

A proxy server is a type of gateway that hides the true network address of the computer(s) connecting through it. A proxy server connects to the Internet, makes the requests for pages, connections to servers, etc., and receives the data on behalf of the computer(s) behind it. The firewall capabilities lie in the fact that a proxy can be configured to allow only certain types of traffic to pass (e.g., HTTP files, or web pages). A proxy server has the potential drawback of slowing network performance, since it has to actively analyze and manipulate traffic passing through it.


Advantages:
Higher security than packet filters
Only need to scrutinize a few allowable applications
Easy to log and audit all incoming traffic

Disadvantages:
Additional processing overhead on each connection (gateway as splice point)

Web application firewall

 A web application firewall is a hardware appliance, server plug-in, or some other software filter that applies a set of rules to a HTTP conversation. Such rules are generally customized to the application so that many attacks can be identified and blocked.


What are Inbound and Outbound rules?

Answer: Inbound rules: These are to do with other things accessing your computer. If you are running a Web Server on your computer then you will have to tell the Firewall that outsiders are allowed to connect to it.

Outbound rules: These are so that you can let some programs use the Internet, and Block others. You will want to let your Web Browser (Internet Explorer, Firefox, Safari, Chrome, Opera...) have access to the Internet, so you will tell Windows Firewall that it's allowed.


Some Benefits and limitations of Firewall.

Benefit
  >Prevent intrusion
  >Choke point for security audit
  >Reduce attacks by hackers
  >Hide network behind a single IP address
  >Part of total network security policy


Limitations
Cannot protect against
    >inside attacks
    >malicious insiders
    >connections that circumvent it
    >completely new threats
    >some viruses
    >the administrator that does not correctly set it up
    >Cannot block attacks at higher level of the protocol stack.

Firewall vs. IDS 

Firewall - A device or application that analyzes packet headers and enforces policy based on protocol type, source address, destination address, source port, and/or destination port. Packets that do not match policy are rejected.

Intrusion Detection System - A device or application that analyzes whole packets, both header and payload, looking for known events. When a known event is detected a log message is generated detailing the event.

Sunday, March 6, 2016

Network Topology

Star topology:


In a star topology, each device has a dedicated point-to-point link only to a central controller, usually called a hub. The devices are not directly linked to one another. Unlike a mesh topology, a star topology does not allow direct traffic between devices. The controller acts as an exchange: Ifone device wants to send data to another, it sends the data to the controller, which then relays the data to the other connected device 



Advantages of Star Topology

1)  As compared to Bus topology it gives far much better performance, signals don’t necessarily get transmitted to all the workstations. A sent signal reaches the intended destination after passing through no more than 3-4 devices and 2-3 links. Performance of the network is dependent on the capacity of central hub.
2)  Easy to connect new nodes or devices. In star topology new nodes can be added easily without affecting rest of the network. Similarly components can also be removed easily.
3)  Centralized management. It helps in monitoring the network.
4)  Failure of one node or link doesn’t affect the rest of network. At the same time its easy to detect the failure and troubleshoot it.

Disadvantages of Star Topology

1)  Too much dependency on central device has its own drawbacks. If it fails whole network goes down.
2)  The use of hub, a router or a switch as central device increases the overall cost of the network.
3)   Performance and as well number of nodes which can be added in such topology is depended on capacity of central device.


Mesh Topology

Mesh In a mesh topology, every device has a dedicated point-to-point link to every other device. The term dedicated means that the link carries traffic only between the two devices it connects. To find the number of physical links in a fully connected mesh network with n nodes, we first consider that each node must be connected to every other node. Node 1must be connected to n - I nodes, node 2 must be connected to n - 1 nodes, and finally node n must be connected to n - 1 nodes. We need n(n - 1) physical links. However, if each physical link allows communication in both directions (duplex
mode), we can divide the number of links by 2. In other words, we can say that in a mesh topology, we need
                                            n(n -1) /2



Advantages of Mesh topology

1) Data can be transmitted from different devices simultaneously. This topology can withstand high traffic.
2) Even if one of the components fails there is always an alternative present. So data transfer doesn’t get affected.
3) Expansion and modification in topology can be done without disrupting other nodes.

Disadvantages of Mesh topology

1) There are high chances of redundancy in many of the network connections.
2) Overall cost of this network is way too high as compared to other network topologies.
3) Set-up and maintenance of this topology is very difficult. Even administration of the network is tough.

Ring Topology

In a ring topology, each device has a dedicated point-to-point connection with only the two devices on either side of it. A signal is passed along the ring in one direction, from device to device, until it reaches its destination. Each device in the ring incorporates a repeater. When a device receives a signal intended for another device, its repeater regenerates the bits and passes them along



Advantages of Ring Topology

1)   This type of network topology is very organized. Each node gets to send the data when it receives an   empty token. This helps to reduces chances of collision. Also in ring topology all the traffic flows in only one  direction at very high speed.
2)   Even when the load on the network increases, its performance is better than that of Bus topology.
3)   There is no need for network server to control the connectivity between workstations.
4)   Additional components do not affect the performance of network.
5)   Each computer has equal access to resources.

Disadvantages of Ring Topology

1)   Each packet of data must pass through all the computers between source and destination. This makes it slower than Star topology.
2)   If one workstation or port goes down, the entire network gets affected.
3)   Network is highly dependent on the wire which connects different components.
4)   MAU’s and network cards are expensive as compared to Ethernet cards and hubs.


Bus Topology

In Bus Topology One long cable acts as a backbone to link all the devices in a network.Nodes are connected to the bus cable by drop lines and taps. A drop line is a connection running between the device and the main cable. A tap is a connector that either splices into the main cable or punctures the sheathing of a cable to create a contact with the metallic core. As a signal travels along the backbone, some of its energy is transform into heat. Therefore, it becomes weaker and weaker as it travels farther and farther. this reason there is a limit on the number of taps a bus can support and on the distance between those taps.




Advantages of  Bus Topology

1)  It is easy to set-up and extend bus network.
2)  Cable length required for this topology is the least compared to other networks.
3)  Bus topology costs very less.
4) Linear Bus network is mostly used in small networks. Good for LAN.

Disadvantages of Bus Topology

1)  There is a limit on central cable length and number of nodes that can be connected.
2)  Dependency on central cable in this topology has its disadvantages.If the main cable (i.e. bus ) encounters   some problem, whole network breaks down.
3)  Proper termination is required to dump signals. Use of terminators is must.
4)  It is difficult to detect and troubleshoot fault at individual station.
5)  Maintenance costs can get higher with time.
6)  Efficiency of Bus network reduces, as the number of devices connected to it increases.
7)  It is not suitable for networks with heavy traffic.
8)  Security is very low because all the computers receive the sent signal from the source.

Basic of Networking

Netowrk 

In computer Science network is a set of computers connected together for the purpose of sharing resources. The most common resource shared today is connection to the Internet. Other shared resources can include a printer or a file server.
A network Computers  can be connected through twisted pair cables, telephone lines, radio waves, satellites or optical fiber cables. The first computer network was designed by ‘Advanced Research Projects Agency Network (ARPANET)’ in the United States Department of Defense. There are three type of network technologies.

LAN: Local Area Network

A Local Area Network (LAN) is a network that is bound to a smaller physical areas like a university, house or a small office. Approximately all current LANs whether wired or wireless are based on Ethernet. On a ‘Local Area Network’ data transfer speeds are higher than WAN and MAN that can extend to a 10.0 Mbps (Ethernet network) and 1.0 Gbps (Gigabit Ethernet).

MAN:Metropolitan Area Network

We can take Bank network as a example of Metropolitan Area Network where all branches located in different districts are interconnected through head office by using fiber optic cables. In one sentense A Metropolitan Area Network (MAN) is a network that connects two or more computers, communicating devices or networks in a single network that has geographic area larger than that covered by even a large ‘Local Area Network’ but smaller than the region covered by a ‘Wide Area Network’.


WAN:Wide Area Network 

Internet is a perfect exaple of WAN. Wide Area Network is a computer network that covers relatively larger geographical area such as a state or country. It provides a solution to companies or organizations operating from distant geographical locations who want to communicate with each other for sharing and managing central data or for general communication.
WAN is made up of two or more Local Area Networks (LANs) or Metropolitan Area Networks (MANs) that are interconnected with each other, thus users and computers in one location can communicate with users and computers in other locations.


Basic IT Questions for exam


Friday, February 26, 2016

OSI Layer tutorial

    Introduction to OSI Layer


In the beginning the development of networks the bad part was that one vendor’s solution was not compatible with another vendor’s solution. This is where the idea for the OSI model was born, having a layered approach to networks our hardware vendors would design hardware for the network, and others could develop software for the application layer. Using an open model which everyone agrees on means we can build networks that are compatible with each other.


To fix this problem the International Organization for Standardization (ISO) researched different network models and the result is the OSI-model which was released in 1984.

Layers are :


Layer 7 – Application layer

This is the closest layer to the end user. It provides the user interface between the applications.  Telnet, FTP, email client (SMTP), HyperText Transfer Protocol (HTTP) are examples of Application layer.


Layer 6 – Presentation layer

 This layer ensures the presentation of data, that the communications passing through are in the appropriate form for the recipient. In general, it acts as a translator of the network.

Character code translation: for example, ASCII to EBCDIC.

Data conversion: bit order, CR-CR/LF, integer-floating point, and so on.

Data compression: reduces the number of bits that need to be transmitted on the network.

Data encryption: encrypt data for security purposes. For example, password encryption.


Layer 5 – Session layer

Layer 5 establishes, maintains and ends communication with the receiving device.


Layer 4 – Transport layer

 Data is reffered here as a segment. This layer maintains flow control of data and provides for error checking and recovery of data between the devices. The most common example of Transport layer is Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Data is reffered here as a segment


Layer 3 – Network layer

  Data is reffered here as a packet. This layer provides logical addresses which routers will use to determine the path to the destination. In most cases, the logic addresses here means the IP addresses (including source & destination IP addresses).


Layer 2 – Data Link Layer


Data is reffered here as a frame. The Data Link layer formats the message into a data frame, and adds a header containing the hardware destination and source address to it. This header is responsible for finding the next destination device on a local network.

Notice that layer 3 is responsible for finding the path to the last destination (network) but it doesn’t care about who will be the next receiver. It is the Layer 2 that helps data to reach the next destination.

This layer is subdivide into 2 sub-layers: logical link control (LLC) and media access control (MAC).

The LLC functions include:

+ Managing frames to upper and lower layers
+ Error Control
+ Flow control

The MAC sublayer carries the physical address of each device on the network. This address is more commonly called a device’s MAC address. MAC address is a 48 bits address which is burned into the NIC card on the device by its manufacturer.

Layer 1 – Physical layer

Data is send here as a bit. The Physical Layer defines the physical characteristics of the network such as connections, voltage levels and timing.

Database basic questions part 1

DDL


Data Definition Language (DDL) statements are used to define the database structure or schema. Some examples:
  • CREATE - to create objects in the database
  • ALTER - alters the structure of the database
  • DROP - delete objects from the database
  • TRUNCATE - remove all records from a table, including all spaces allocated for the records are removed
  • COMMENT - add comments to the data dictionary
  • RENAME - rename an object

DML


Data Manipulation Language (DML) statements are used for managing data within schema objects. Some examples:
  • SELECT - retrieve data from the a database
  • INSERT - insert data into a table
  • UPDATE - updates existing data within a table
  • DELETE - deletes all records from a table, the space for the records remain
  • MERGE - UPSERT operation (insert or update)
  • CALL - call a PL/SQL or Java subprogram
  • EXPLAIN PLAN - explain access path to data
  • LOCK TABLE - control concurrency

DCL


Data Control Language (DCL) statements. Some examples:
  • GRANT - gives user's access privileges to database
  • REVOKE - withdraw access privileges given with the GRANT command

TCL


Transaction Control (TCL) statements are used to manage the changes made by DML statements. It allows statements to be grouped together into logical transactions.
  • COMMIT - save work done
  • SAVEPOINT - identify a point in a transaction to which you can later roll back
  • ROLLBACK - restore database to original since the last COMMIT
  • SET TRANSACTION - Change transaction options like isolation level and what rollback segment to use
Trigger
    A database trigger is procedural code that is naturally executed in light of specific occasions on a specific table or view in a database. The trigger is generally utilized for keeping up the uprightness of the data on the database. For instance, when another record (speaking to another laborer) is added to the workers table, new records ought to likewise be made in the tables of the charges, get-aways and pay rates. Triggers can likewise be utilized to log recorded information, for instance to monitor representatives' past compensations 

RDMS 

     RDBMS Database is a relational database. It is the standard dialect for relational database administration systems.Data is put away as lines and segments in RDBMS. The relations among tables are additionally put away as the table SQL (Structured quiry Language) is a programming Language used to perform undertakings, for example, refresh information on a database, or to recover information from a database. Some normal relational database administration frameworks that utilization SQL are: Oracle, Sybase, Microsoft SQL Server, Access, and so on.

 Schema
   
    A database schema is a approach to logically group objects such as tables, views, stored procedures etc. Think of a schema as a container of objects.You can assign a user login permissions to a single schema so that the user can only access the objects they are authorized to access.

Schemas can be  made and modified in a database, and users can be granted access to a schema. A schema can be owned by any user, and schema ownership is transferable. 

Thursday, February 25, 2016

Static vs Dynamic Routing

In static routing, network administrator manually enters entries to the routing tables. But in dynamic routing, network administrator does not have to enter any entries as the entries are auto generated.

• For static routing, the action is to just do a lookup on a table and hence does not need any processing making the hardware less costly. But, dynamic routing algorithms involves a lot of calculations. Hence, it requires much processing capabilities. As a result, the hardware would be costly. 

 In dynamic routing, routing entries are generated using complex routing algorithms. In static routing, no such algorithms are involved.

• In static routing, routers do not advertize or broadcast any information about the links to other routers. But, in dynamic routing, tables are generated using such information advertised by routers.

In static Routing need to set destination network in routing table with gateway.
 



   Router configuration( Static Routing):
   
   R1
   ******
   #configure terminal
   #ip route 192.168.3.0 255.255.255.0 192.168.2.2

   R2
   ******
   #configure terminal
   #ip route 192.168.1.0 255.255.255.0 192.168.2.1

   Router configuration( Dynamic Routing RIP):
   R1
   ******
   #configure terminal
   #router rip
   #version 2
   #network 192.168.1.0   
   #network 192.168.2.0

   R2
   ******
   #configure terminal
   #router rip
   #version 2
   #network 192.168.3.0
   #network 192.168.2.0

In Dynamic Routing We just entry the connected network to share with other router.


In Dynamic Routing no need to set destination network in routing table. Dynamic Routing Protocols
help the network administrator manage the time-consuming and exacting process of configuring and
maintaining static routes.