Routing table - network layer and routing , Computer Networking

Assignment Help:

Routing Table

A routing  table has columns  for at  three types o information  the network  ID  the cost  and the  ID of the  next  router. The  network  ID is the final  destination of the packet. The cost  is  the number of hops  a packets  must make  to get  there. And  the next  router is the router  to which  a packet  must  be delivered  on its  way  to a particular destination.

The  original  routing  tables for  our sample  internetwork  are show  in this point  the third  column is empty because the only  destination network  identified  are those  attached to the current  router.

No multiple  hop  destination and  therefore  no next  router have been identified. These  basic  tables  are sent out to neighbours. For  example A sends is  routing take  to routers B, F sends E, B send it routing table  to routers C and A  and so on:

When a receives  a routing  from  B it uses the information to update  its own  table. A adjusts  the information  shown B table by  adding  one to  each listed cost. It then  combines  the table  with it own to create a new  more comprehensive  table.

This  process  continues for all routers. Every  router  receives information from  neighbours  and updates its  routing  table. If  there are no more  changes the final  tables  may look like  those shown.


Related Discussions:- Routing table - network layer and routing

Connection oriented transport tcp - transport layer, Connection Oriented Tr...

Connection Oriented Transport TCP In addition  to providing  reliable communication transmission control protocols  effects errors  control flow  control  and resequencing of

Show data link and physical vs subnet, Q. Show Data link and Physical vs Su...

Q. Show Data link and Physical vs Subnet? - Data link layer The function of the Data Link Layer is -offers for the control of the physical layer and detects and possib

What are proxy server, What are proxy servers and how do they protect compu...

What are proxy servers and how do they protect computer networks? Proxy servers primarily stop external users who identifying the IP addresses of an internal network. Without i

State about the cell sectoring, State about the Cell sectoring With cel...

State about the Cell sectoring With cell sectoring, a cell is separated into a number of wedge-shaped sectors, each with its own set of channels, typically 3 or 6 sectors per c

Difference between tftp and ftp application layer protocols, What is the di...

What is the difference between TFTP and FTP application layer protocols? The Trivial File Transfer Protocol (TFTP) allows a local host to obtain files from a remote host but d

Security, .test a number to be prime number in network security

.test a number to be prime number in network security

What is subnetting, Used in IP Networks to break up larger networks into sl...

Used in IP Networks to break up larger networks into slighter subnetworks. It is used to decrease network traffic, Optimized network performance, and make simpler management i.e. t

Advantages of firewall, Firewall The NAT router allows receiving of num...

Firewall The NAT router allows receiving of number of a data streams. If it receives a transmission in the form of acknowledgement or data streams or error responses from an ex

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd