Hierarchical addressing and routing, Computer Networking

The steps of forwarding the packets of information is known routing. The information about receivers is saved in routing tables. Note that several entries have same next hop. It is given in the diagram.

1508_hierarichal address androuting.png

In particular all receivers on same switch have similar next hop. These routing tables may be collapsed. A specific routing table is given in the figure.

1028_routing.png

Posted Date: 7/31/2012 6:46:00 AM | Location : United States







Related Discussions:- Hierarchical addressing and routing, Assignment Help, Ask Question on Hierarchical addressing and routing, Get Answer, Expert's Help, Hierarchical addressing and routing Discussions

Write discussion on Hierarchical addressing and routing
Your posts are moderated
Related Questions

There are various computational models for representing the parallel computers. In this part, we discuss various models. These models would give a platform for the designing as wel

An Internet address (IP address) is a unique 32-bit binary number given to a host and used for all interaction with the host. Each packet transmit across an Internet contains the 3

Why Routine security audits are essential It is essential that regular security audits are conducted to find out physically which computer is connected and permits access to

State the Network environment of Intranets and Internet Intranets as well as the Internet are based purely on networks, the company intending to install Intranet must consider


State the Example of security audit as case study Linda narrates one of her experience about a security audit. She was performing a spot audit where she was checking certain

Throughput is a calculate of the rate at which data can be transmit through the network. The throughput capability of the underlying hardware is known bandwidth. Because every fram

CYCLE OF BRIDGES:  A bridges network can join several segments. One bridge is useded to connect every segment to the rest of the bridge network. This is given in the figure be

(i)  Suppose that frames are 1250 bytes long including 25 bytes of overhead. Also assume that ACK frames are 25 bytes long. a)  Calculate the efficiency of stop-and-wait ARQ in