Dynamic routing under_sec

1,610 views

Published on

Published in: Technology, Business
1 Comment
6 Likes
Statistics
Notes
No Downloads
Views
Total views
1,610
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
0
Comments
1
Likes
6
Embeds 0
No embeds

No notes for slide
  • Dynamic routing protocols are "languages" routers use to communicate the details and status of networks to which they are connected. Examples include  RIP ,  OSPF ,  EIGRP ,  BGP  and  IS-IS . 
  • Dynamic routing under_sec

    1. 1. DYNAMIC ROUTING UNDER  SECURITY CONSIDERATIONS By Archana
    2. 2. TABLE OF CONTENTS <ul><ul><li>Introduction </li></ul></ul><ul><ul><li>Routing </li></ul></ul><ul><ul><li>Static Routing </li></ul></ul><ul><ul><li>Disadvantages of Static Routing </li></ul></ul><ul><ul><li>Dynamic Routing </li></ul></ul><ul><ul><li>Security problems in Routing  </li></ul></ul><ul><ul><li>Topology </li></ul></ul><ul><ul><li>Routing Algorithms </li></ul></ul><ul><ul><li>Objective </li></ul></ul><ul><ul><li>Conclusion </li></ul></ul>
    3. 3. INTRODUCTION <ul><ul><li>Networking is growing rapidly </li></ul></ul><ul><ul><li>Dynamic routing necessity in large networks </li></ul></ul><ul><ul><li>Need to consider the security problems </li></ul></ul>
    4. 4. ROUTER AND ROUTING <ul><ul><li>Router forwards data packets across computer networks. </li></ul></ul><ul><li>  </li></ul><ul><ul><li>Functionality </li></ul></ul><ul><li>  </li></ul><ul><ul><li>Routing Tables </li></ul></ul><ul><li>  </li></ul><ul><li>  </li></ul><ul><ul><li>Routing is selecting paths in a network along which to send network traffic. </li></ul></ul>
    5. 5. TOPOLOGY <ul><li>  </li></ul>
    6. 6. STATIC ROUTING <ul><ul><li>Manually adding routes to the routing table. </li></ul></ul><ul><li>  </li></ul><ul><ul><li>routes through a data network are described by fixed paths </li></ul></ul><ul><li>  </li></ul><ul><ul><li>usually entered into the router by the system administrator. </li></ul></ul><ul><li>  </li></ul><ul><ul><li>static routing table is created, maintained, and updated by a network administrator, manually. </li></ul></ul><ul><li>  </li></ul>
    7. 7. DISADVANTAGES OF STATIC ROUTING <ul><ul><li>Difficult to configure </li></ul></ul><ul><li>  </li></ul><ul><ul><li>Cannot adapt to addition of new links or nodes </li></ul></ul><ul><li>  </li></ul><ul><ul><li>Cannot adapt to link or node failures </li></ul></ul><ul><li>  </li></ul><ul><ul><li>Cannot easily handle multiple paths to a destination </li></ul></ul><ul><li>  </li></ul><ul><ul><li>Does not scale to large networks </li></ul></ul><ul><li>  </li></ul><ul><ul><li>Solution is to use Dynamic Routing </li></ul></ul>
    8. 8. DYNAMIC ROUTING <ul><ul><li>  Selection of the routing path by the router upon updating the routing table dynamically. </li></ul></ul><ul><ul><li>Follow Dynamic Routing protocol to update messages between routers </li></ul></ul><ul><li>  </li></ul><ul><ul><li>Automatically update routing table when topology changes </li></ul></ul><ul><li>  </li></ul><ul><ul><li>Determine best path to a destination.   </li></ul></ul>
    9. 9. DYNAMIC ROUTING PROTOCOLS <ul><li>Function(s) of Dynamic Routing Protocols : </li></ul><ul><ul><li>-Dynamically share information between routers. </li></ul></ul><ul><ul><li>-Automatically update routing table when topology changes. </li></ul></ul><ul><ul><li>-Determine best path to a destination. </li></ul></ul>
    10. 10. DYNAMIC ROUTING VS STATIC ROUTING Complexity Configuration Generally Independent of the Network size Increases with network size Required Administrator Knowledge Advanced Knowledge Required No Extra Knowledge is required Topology Changes automatically Adopts to Topology Changes Administrator intervention is required Scaling Suitable for simple and complex networks Suitable for simple networks Security Less secure More Secure Predictability Routing Depends on the current topology Routing to destination is always same
    11. 11. ROUTING TABLE <ul><li>It is a data structure in the form of a table-like object stored in a router </li></ul><ul><li>Table consists of at least three information fields:- </li></ul><ul><li>Network id </li></ul><ul><li>Cost </li></ul><ul><li>Next hop </li></ul>
    12. 12. EXAMPLE Routing table for B Destination Cost Next Hop A 1 A C 1 C D 2 C E 2 A F 2 A G 3 A
    13. 13. SECURITY PROBLEMS <ul><li>  O rganization system needs high security for data transmission from one organization to other organizations system. </li></ul><ul><li>Hackers can steel the information from the organization if the network is not secured. </li></ul><ul><li>Security is major problem in Defence and Government network organizations. </li></ul>
    14. 14. ROUTING ALGORITHMS <ul><li>  Mainly two types of algorithms: </li></ul><ul><li>Link state Routing Algorithm </li></ul><ul><ul><li>Network topology is known by all nodes </li></ul></ul><ul><li>Distance Vector Routing Algorithm </li></ul><ul><ul><li>Rely on exchanging info among neighbor nodes. </li></ul></ul>
    15. 15. OBJECTIVE <ul><li>  To Analyze the existing Routing Algorithms </li></ul><ul><li>Propose a new Routing Algorithm which satisfies the security problems </li></ul><ul><li>Conduct simulation to verify the results </li></ul><ul><li>Show the capability of the proposed algorithm </li></ul>
    16. 16. CONCLUSION <ul><li>  Efficient Algorithms are needed for optimal path selection in large networks. </li></ul><ul><li>Secured algorithms are also needed for the routing. </li></ul><ul><li>Proposed Algorithm should support many routing protocols </li></ul><ul><li>Test the proposed algorithm on various networks. </li></ul>
    17. 17. THANK YOU      

    ×