Routing principle - network layer and routing , Computer Networking

Assignment Help:

Routing Principle

The principle  criterion of  successful routing is of course correctness but it not only criterion. You might  prefer to take the most direct route ( the  one that  the least time and uses the least fuel) the  most reliable route (the one  is not likely to be closed by a heavy snowfall) the most scenic route ( the  one that flows pleasant country roads rather than  busy highways) the  least  expensive route ( the  one that follow freeways  rather  than toll roads0  or the safest route ( the one  that avoids the army missile testing  range) in its  most  general form optimal routing involves forwarding a packet from source to destination using the best path.

Routing  is the methods of delivering a message from  source to target ( which  are not  directly  connected )suing  multiple other hosts in the middle to forward the message.

Routers  perform  two things  to deliver the packets to its destination.

a.First is learning  the logical  of the network  to store the path inside the routing  table  to where the traffic should  flow which  called routing.

b.Second  is forwarding those  packets  learned from an inbound interface to the  out  bound interface with  in the  ourter which  is called switching.

The  observation suggest  that an open systems  routing  architecture should.

a.Scale well .

b.Support  many different sub network types and multiple qualities of service.

c.Adapt to topology  changes quickly and efficiently ( i ,e with minimum overhead  and complexity).

d.Provide controls  that facilitate the safe connection of multiple  organizations.

It is not likely  that the  manual administration of static routing tables  will satisfy these  objectives  for  a network  connecting  more than  a few  hundred  systems. A routing  scheme for a large  scale  open  systems  network must  biodynamic adaptive and decentralized, be  capable of supporting multiple paths  offering  different  types of service and provide the  means to establish trust firewalls and security across  multiple  administrations.


Related Discussions:- Routing principle - network layer and routing

Connection oriented transport tcp - transport layer, Connection Oriented Tr...

Connection Oriented Transport TCP In addition  to providing  reliable communication transmission control protocols  effects errors  control flow  control  and resequencing of

Advantages of ls over dv algorithm, Advantages of LS over DV algorithm ...

Advantages of LS over DV algorithm There  are a number of advantages to link  state  protocols  especially when  compared to  the distance vector based  routing  protocols. The

What is aspects of security, Q. What is Aspects of Security? - Securit...

Q. What is Aspects of Security? - Security Attack: Any action whichcompromises the security of information owned by an organization. - Security Mechanism: A mechanism th

How does a firewall protect, How Does a Firewall Protect Firewalls work...

How Does a Firewall Protect Firewalls work by controlling the information that comes in and out of the network. By using the Application Proxy service, the flow of information

Diffuse reflection in the basic illumination model, Question: (a) By ma...

Question: (a) By making use of an example, explain the Cohen-Sutherland line clipping algorithm. (b) Compare and contrast between the CMY and RGB colour models. (c) Expla

Explanation of internetworking terms and concepts, Question: (a) Outlin...

Question: (a) Outline the main interactions that take place when a user requests a valid web resource in the Address Bar of a modern web client till the resource is eventually

Programming based on message passing, Programming Based on Message Passing ...

Programming Based on Message Passing As we know, the programming model based on message passing uses high level programming languages like C/C++ along with a number of message

Timesharing system, advantages and disadvantages of time sharing system

advantages and disadvantages of time sharing system

Subnet/address mask, To use a subnet or classless address, table under rout...

To use a subnet or classless address, table under routers and hosts that have address must keep two pieces of information with every address: the 32-bit address itself and another

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd