Ethical Hacking
DoS (Denial of Service) Attack Tutorial: Ping of Death, DDOS
What is DoS Attack? DOS is an attack used to deny legitimate users access to a resource such as...
Routing Protocols are the set of defined rules used by the routers to communicate between source & destination. They do not move the information to the source to a destination, but only update the routing table that contains the information.
Network Router protocols helps you to specify way routers communicate with each other. It allows the network to select routes between any two nodes on a computer network.
There are mainly two types of Network Routing Protocols
Static routing protocols are used when an administrator manually assigns the path from source to the destination network. It offers more security to the network.
Dynamic routing protocols are another important type of routing protocol. It helps routers to add information to their routing tables from connected routers automatically. These types of protocols also send out topology updates whenever the network changes' topological structure.
Distance Vector Protocols advertise their routing table to every directly connected neighbor at specific time intervals using lots of bandwidths and slow converge.
In the Distance Vector routing protocol, when a route becomes unavailable, all routing tables need to be updated with new information.
The following are types of protocols which help data packets find their way across the Internet:
RIP is used in both LAN and WAN Networks. It also runs on the Application layer of the OSI model. The full form of RIP is the Routing Information Protocol. Two versions of RIP are
The original version or RIPv1 helps you determine network paths based on the IP destination and the hop count journey. RIPv1 also interacts with the network by broadcasting its IP table to all routers connected with the network.
RIPv2 is a little more sophisticated as it sends its routing table on to a multicast address.
IGRP is a subtype of the distance-vector interior gateway protocol developed by CISCO. It is introduced to overcome RIP limitations. The metrics used are load, bandwidth, delay, MTU, and reliability. It is widely used by routers to exchange routing data within an autonomous system.
This type of routing protocol is the best for larger network size as it broadcasts after every 90 seconds, and it has a maximum hop count of 255. It helps you to sustain larger networks compared to RIP. IGRP is also widely used as it is resistant to routing loop because it updates itself automatically when route changes occur within the specific network. It is also given an option to load balance traffic across equal or unequal metric cost paths.
Link State Protocols take a unique approach to search the best routing path. In this protocol, the route is calculated based on the speed of the path to the destination and the cost of resources.
Link state routing protocol maintains below given three tables:
EGP is a protocol used to exchange data between gateway hosts that are neighbors with each other within autonomous systems. This routing protocol offers a forum for routers to share information across different domains. The full form for EGP is the Exterior Gateway Protocol. EGP protocol includes known routers, network addresses, route costs, or neighboring devices.
EIGRP is a hybrid routing protocol that provides routing protocols, distance vector, and link-state routing protocols. The full form routing protocol EIGRP is Enhanced Interior Gateway Routing Protocol. It will route the same protocols that IGRP routes using the same composite metrics as IGRP, which helps the network select the best path destination.
Open Shortest Path First (OSPF) protocol is a link-state IGP tailor-made for IP networks using the Shortest Path First (SPF) method.
OSPF routing allows you to maintain databases detailing information about the surrounding topology of the network. It also uses the Dijkstra algorithm (Shortest path algorithm) to recalculate network paths when its topology changes. This protocol is also very secure, as it can authenticate protocol changes to keep data secure.
Here are some main difference between these Distance Vector and Link State routing protocols:
Distance Vector | Link State |
---|---|
Distance Vector protocol sends the entire routing table. | Link State protocol sends only link-state information. |
It is susceptible to routing loops. | It is less susceptible to routing loops. |
Updates are sometimes sent using broadcast. | Uses only multicast method for routing updates. |
It is simple to configure. | It is hard to configure this routing protocol. |
Does not know network topology. | Know the entire topology. |
Example RIP, IGRP. | Examples: OSPF IS-IS. |
ISIS CISCO routing protocol is used on the Internet to send IP routing information. It consists of a range of components, including end systems, intermediate systems, areas, and domains.
The full form of ISIS is Intermediate System-to-Intermediate System. Under the IS-IS protocol, routers are organized into groups called areas. Multiple areas are grouped to make form a domain.
BGP is the last routing protocol of the Internet, which is classified as a DPVP (distance path vector protocol). The full form of BGP is the Border Gateway Protocol.
This type of routing protocol sends updated router table data when changes are made. Therefore, there is no auto-discovery of topology changes, which means that the user needs to configure BGP manually.
Routing protocols are required for the following reasons:
Here are some main difference between these routing protocols:
Classful Routing Protocols | Classless Routing Protocols |
---|---|
Classful routing protocols never send subnet mask detail during routing updates. | Classless routing protocols can send IP subnet mask information while doing routing updates. |
RIPv1 and IGRP are classful protocols. These two are classful protocols as they do not include subnet mask information. | RIPv2, OSPF, EIGRP, and IS-IS are all types of class routing protocols which has subnet mask information within updates. |
Features | RIP V1 | RIP V2 | IGRP | OSPF | EIGRP |
---|---|---|---|---|---|
Classful/Classless | Classful | Classless | Classful | Classless | Classless |
Metric | Hop | Hop | Composite Bandwidth, Delay. | Bandwidth | Composite, Bandwidth, Delay. |
Periodic | 30 seconds | 30 seconds | 90 seconds | None | 30 seconds |
Advertising Address | 255.255.255.255.255 | 223.0.0.9 | 255.255.255.255.255 | 224.0.0.5 224.0.0.6 | 224.0.0.10 |
Category | Distance Vector | Distance Vector | Distance Vector | Link State | Hybrid |
Default Distance | 120 | 120 | 200 | 110 | 170 |
What is DoS Attack? DOS is an attack used to deny legitimate users access to a resource such as...
Vulnerability scanners are automated tools that constantly evaluate the software system's security risks to...
IP and Network scanning tools are software that identify various loopholes of network and...
YouTube TV is one of the most famous streaming services. VPN or Virtual Private Network helps you...
More people have access to the internet than ever before. This has prompted many organizations to...
Ethical hacking is identifying weaknesses in computer systems or networks to exploit its...