Routing table - network layer and routing , Computer Networking

Assignment Help:

Routing Table

A routing  table has columns  for at  three types o information  the network  ID  the cost  and the  ID of the  next  router. The  network  ID is the final  destination of the packet. The cost  is  the number of hops  a packets  must make  to get  there. And  the next  router is the router  to which  a packet  must  be delivered  on its  way  to a particular destination.

The  original  routing  tables for  our sample  internetwork  are show  in this point  the third  column is empty because the only  destination network  identified  are those  attached to the current  router.

No multiple  hop  destination and  therefore  no next  router have been identified. These  basic  tables  are sent out to neighbours. For  example A sends is  routing take  to routers B, F sends E, B send it routing table  to routers C and A  and so on:

When a receives  a routing  from  B it uses the information to update  its own  table. A adjusts  the information  shown B table by  adding  one to  each listed cost. It then  combines  the table  with it own to create a new  more comprehensive  table.

This  process  continues for all routers. Every  router  receives information from  neighbours  and updates its  routing  table. If  there are no more  changes the final  tables  may look like  those shown.


Related Discussions:- Routing table - network layer and routing

Show the process of mail delivery, Q. Show the process of Mail Delivery? ...

Q. Show the process of Mail Delivery? Mail Delivery -Consists of three stages -First stage - email goes from user agent to local server, where it is stored until it ma

command saves the configuration stored in ram to nvram, Which command save...

Which command saves the configuration stored in RAM to NVRAM Ans) copy running-config startup-config is the command which saves the configuration stored in RAM to NVRAM

Shared memory programming, We know that all processors share a common memor...

We know that all processors share a common memory in shared memory model. Every processor, however, can be assigned a different part of the program stored in the memory to implemen

Benefits of mpls vpn- wireless technology, 1) The school has implemented a ...

1) The school has implemented a pilot MPLS VPN which is being evaluated to replace the Bell South Frame Relay solution that provides connectivity to the Bascom Palmer Eye-Institute

Show nonreturn to zero encoding, Q. Show Nonreturn to Zero encoding? - ...

Q. Show Nonreturn to Zero encoding? - Value of signal is for all time positive or negative - NRZ-L Signal level depends on bit represented; positive typically means 0

Explain monitor stations of token passing, Monitor Stations Lost t...

Monitor Stations Lost tokens - timer is issued each time a frame or token is generated If no frame is received in time period new token is generated by a monitor stat

What are called fat clients and fat servers, What are called Fat clients an...

What are called Fat clients and Fat servers? If the bulk of the application runs on the Client side, then it is Fat clients. It is used for decision support and personal softwa

What is difference among rip and ripv2, RIP It is Broadcast There i...

RIP It is Broadcast There is no authentication It Support FLSM   RIPV2 It is Multicast There is Authentication It Support VLSM

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd