Sharing information - network layer and routing , Computer Networking

Sharing  information 

To understand  how distance vector routing  works examine the  internet shown in  the  clouds represents local  area network . the  number  inside each cloud that LAN network ID>these LAN  can be  of any  type represented  by the boxes labelled A, B, C, D, E  and F,

Distance vector routing  simplifies  the  routing  process by  assuming  cost  of one  unit for every  link.

Shows the first  step in  the algorithm. The next  boxes  indicate the  relationship  of the  routers. Each  router  sends  its informant on about  internetwork only to  immediate neighbours.

A router  sends its  knowledge to its neighbours . the neighbours  add this  knowledge  to their  own  knowledge and send the whole table to their  own neighbours. In this way the first  router  gets its own information  back plus new information about its  neighbour  other neighbour . each  of these neighbours adds  its knowledge and sends the  updated table eon to its own neighbours  and so on.  Eventually every  router in internetwork.

Posted Date: 3/16/2013 3:31:54 AM | Location : United States







Related Discussions:- Sharing information - network layer and routing , Assignment Help, Ask Question on Sharing information - network layer and routing , Get Answer, Expert's Help, Sharing information - network layer and routing Discussions

Write discussion on Sharing information - network layer and routing
Your posts are moderated
Related Questions
Question: (a) How can governments provide the mobile industry with the long-term clarity and certainty it needs to make substantial capital investments in new networks? (b)

In 3-tier Client/Server systems, the application logic (or process) lives in the middle tier and it is removed from the data and the user interface. In theory, the 3-tier Client/Se

Encoding Process c= uG u: binary data sequence of length 4( input) G: Generator matrix which is 7*4 c: Codeword     D

Coaxial Applications & Performance - Analog plus digital phone networks - Cable TV networks - Traditional Ethernet LANs - Power line and Home Networks-phone line -


Round Trip Time (RTT) and Time Out The  size and  the complexity  of computer  networks  have grown  in past years. To achieve  an efficient  and reliable transmission  some

Lat take the CONNECT (client side), LISTEN, and ACCEPT (server side) socket primitives a) Why are these three needed for a TCP connection? b) Why are none of them needed for a U

Security models by giving striking analogies to the real world A classical case study: (With due acknowledgements to the security exponent who proposed this theory.) He has c

Protocol Layering To design  structural  network protocols the designers organize protocol and use the network  hard ware and software to implement  the protocol  in layers. E