Routing table - network layer and routing , Computer Networking

Assignment Help:

Routing Table

A routing  table has columns  for at  three types o information  the network  ID  the cost  and the  ID of the  next  router. The  network  ID is the final  destination of the packet. The cost  is  the number of hops  a packets  must make  to get  there. And  the next  router is the router  to which  a packet  must  be delivered  on its  way  to a particular destination.

The  original  routing  tables for  our sample  internetwork  are show  in this point  the third  column is empty because the only  destination network  identified  are those  attached to the current  router.

No multiple  hop  destination and  therefore  no next  router have been identified. These  basic  tables  are sent out to neighbours. For  example A sends is  routing take  to routers B, F sends E, B send it routing table  to routers C and A  and so on:

When a receives  a routing  from  B it uses the information to update  its own  table. A adjusts  the information  shown B table by  adding  one to  each listed cost. It then  combines  the table  with it own to create a new  more comprehensive  table.

This  process  continues for all routers. Every  router  receives information from  neighbours  and updates its  routing  table. If  there are no more  changes the final  tables  may look like  those shown.


Related Discussions:- Routing table - network layer and routing

Combinational circuit for sorting the string, Every input line of the combi...

Every input line of the combinational circuit represents an individual element of the string say xi and every output line results in the form of a sorted list. In order to attain t

Explain the term- congestion, Explain the term- congestion The average ...

Explain the term- congestion The average queue size over the last cycle and the current cycle is calculated. This value is the threshold. By averaging over two cycles instead o

Define the term socks- network security, Define the term Socks- Network sec...

Define the term Socks- Network security As it is well known, each type of network security protects data at a different layer of the OSI model. Built-in at each layer lies the

Illustrate the advantages of VLANs, Q. Illustrate the Advantages of VLANs? ...

Q. Illustrate the Advantages of VLANs? - Cost and time reduction in moving stations from one group to another - Creation of virtual workgroups - Security Position of

Multiplexing and de multiplexing, Multiplexing  and De multiplexing An...

Multiplexing  and De multiplexing Another  critical set of services that are provided by the transport layer is that of application multiplexing and de multiplexing. This featu

Explain about flow control, Q. Explain about Flow Control? - Signifies...

Q. Explain about Flow Control? - Signifies to ask the transmitter to stop/resume sending in data - Required when DTE to DCE speed > DCE to DCE speed - (Exampl

Independent loops statement, INDEPENDENT Loops HPF gives additional opp...

INDEPENDENT Loops HPF gives additional opportunities for parallel implementation by using the INDEPENDENT directive to assert that the iterations of a do-loop can be done indep

State the security concerns, State the Security concerns The history of...

State the Security concerns The history of security concerns is not new. They have been of great worry to man and for many centuries man has been endeavouring to devise new tec

Subnetting ip addresses, Explain everything you can tell from the following...

Explain everything you can tell from the following: a. 00-01-00-01-13-FD-F4-C0-00-1E-33-92-CE-99 b. fe80::2c1e:18af:749b:91c5%12 c. 2002:8b64:6e3a::8b64:6e3a d. ::0

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd