Routing principle - network layer and routing , Computer Networking

Assignment Help:

Routing Principle

The principle  criterion of  successful routing is of course correctness but it not only criterion. You might  prefer to take the most direct route ( the  one that  the least time and uses the least fuel) the  most reliable route (the one  is not likely to be closed by a heavy snowfall) the most scenic route ( the  one that flows pleasant country roads rather than  busy highways) the  least  expensive route ( the  one that follow freeways  rather  than toll roads0  or the safest route ( the one  that avoids the army missile testing  range) in its  most  general form optimal routing involves forwarding a packet from source to destination using the best path.

Routing  is the methods of delivering a message from  source to target ( which  are not  directly  connected )suing  multiple other hosts in the middle to forward the message.

Routers  perform  two things  to deliver the packets to its destination.

a.First is learning  the logical  of the network  to store the path inside the routing  table  to where the traffic should  flow which  called routing.

b.Second  is forwarding those  packets  learned from an inbound interface to the  out  bound interface with  in the  ourter which  is called switching.

The  observation suggest  that an open systems  routing  architecture should.

a.Scale well .

b.Support  many different sub network types and multiple qualities of service.

c.Adapt to topology  changes quickly and efficiently ( i ,e with minimum overhead  and complexity).

d.Provide controls  that facilitate the safe connection of multiple  organizations.

It is not likely  that the  manual administration of static routing tables  will satisfy these  objectives  for  a network  connecting  more than  a few  hundred  systems. A routing  scheme for a large  scale  open  systems  network must  biodynamic adaptive and decentralized, be  capable of supporting multiple paths  offering  different  types of service and provide the  means to establish trust firewalls and security across  multiple  administrations.


Related Discussions:- Routing principle - network layer and routing

Different types of subnet classfull networks are present, How many dissimil...

How many dissimilar types of subnet classful networks are present?

Firewall architectures-screening router, Screening Router In this setu...

Screening Router In this setup network router acts as a firewall. It checks all incoming and outgoing packets according to the predefined rules. This filter is placed at the c

Calculate the peak-to-peak voltage of the signal, A multimeter is used to m...

A multimeter is used to measure a sinusoidal signal and reads 2V RMS; what is the peak-to-peak voltage of the signal? A mark will be deducted if you do not quote your answer to 2 s

Working of TCP - buffers, Q. Working of  TCP - buffers? TCP - buffers ...

Q. Working of  TCP - buffers? TCP - buffers Sending & receiving buffers - Processes don't consume data at the same speed Sending site: - White section: unfilled

Implement a transport layer protocol to transmit data, In this project, you...

In this project, you will implement a Transport Layer protocol to transmit data with Reliable Data Transfer from a client to a server in the presence of channel errors and loss. Th

What is workstation, What is workstation? A workstation is a node in ne...

What is workstation? A workstation is a node in network that is more useful and can occur local information processing or graphics processing. A workstation generally has an in

Describe about the server and browser software, Describe about the Server a...

Describe about the Server and browser software Most of the server and browser software developed by various vendors carry out encryption using either a 40-bit or a 128-bit sec

Tools that an attacker can use to crack wep, Question: Consider that yo...

Question: Consider that you have to configure a small WLAN of 8 computers using Wired Equivalent Privacy (WEP) and that you have to best make use of its available security f

Describe the following topics, Describe the following topics A . LAN B . M...

Describe the following topics A . LAN B . MAN C . WAN D . ARPANET

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd