Sharing information - network layer and routing , Computer Networking

Assignment Help:

Sharing  information 

To understand  how distance vector routing  works examine the  internet shown in  the  clouds represents local  area network . the  number  inside each cloud that LAN network ID>these LAN  can be  of any  type represented  by the boxes labelled A, B, C, D, E  and F,

Distance vector routing  simplifies  the  routing  process by  assuming  cost  of one  unit for every  link.

Shows the first  step in  the algorithm. The next  boxes  indicate the  relationship  of the  routers. Each  router  sends  its informant on about  internetwork only to  immediate neighbours.

A router  sends its  knowledge to its neighbours . the neighbours  add this  knowledge  to their  own  knowledge and send the whole table to their  own neighbours. In this way the first  router  gets its own information  back plus new information about its  neighbour  other neighbour . each  of these neighbours adds  its knowledge and sends the  updated table eon to its own neighbours  and so on.  Eventually every  router in internetwork.


Related Discussions:- Sharing information - network layer and routing

Layered architecture - computer network, Layered Architecture The best...

Layered Architecture The best  way to  understand  any complex system is to break  it into  pieces  and then analyze what they  do and  how they interact. The most logical app

Client server processes - application layer, Client  Server Processes ...

Client  Server Processes A network  application  consist  of pairs  of process that send message to one  another  over a network. For  example  in a web application a client

Diiferentiate between html and http, Diiferentiate between HTML and HTTP ...

Diiferentiate between HTML and HTTP Hypertext Markup Language (HTML) The language used in writing pages for the World Wide Web. Knowledge of not HTML is not necessary f

Dns - server attacks, DNS - Server Attacks It’s not so easy to list al...

DNS - Server Attacks It’s not so easy to list all the associated attacks as they are evolving way so fast. As any error of flaw is identified, a patch is released in response

One characteristic of rarp?, Reverse Address Resolution Protocol is used to...

Reverse Address Resolution Protocol is used to get a layer 3 address if the MAC address is called which then facilitates the loading of the O/S.

Determine the objectives of computer security, Determine the Objectives of ...

Determine the Objectives of computer security Though computerisation helps a lot in proper organisation of experience, it also opens a Pandora's Box simultaneously. On one

Bridges, BRIDGES:  A bridge is a hardware device also needed to connec...

BRIDGES:  A bridge is a hardware device also needed to connect two LAN code segments to extend a LAN. A bridge uses two NICs to connect two code segments. It listens to all tr

Write the definition of SAN, Write the definition of SAN A SAN is a sep...

Write the definition of SAN A SAN is a separate network to handle storage requirements. The SAN detaches storage tasks from specific servers and makes a shared storage facility

What are the disadvantages of bus topology, What are the disadvantages of b...

What are the disadvantages of bus topology? The disadvantages of bus topology are: a. The bus networks are dissimilar to reconfigure, especially when the acceptable number o

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd