Sharing information - network layer and routing , Computer Networking

Sharing  information 

To understand  how distance vector routing  works examine the  internet shown in  the  clouds represents local  area network . the  number  inside each cloud that LAN network ID>these LAN  can be  of any  type represented  by the boxes labelled A, B, C, D, E  and F,

Distance vector routing  simplifies  the  routing  process by  assuming  cost  of one  unit for every  link.

Shows the first  step in  the algorithm. The next  boxes  indicate the  relationship  of the  routers. Each  router  sends  its informant on about  internetwork only to  immediate neighbours.

A router  sends its  knowledge to its neighbours . the neighbours  add this  knowledge  to their  own  knowledge and send the whole table to their  own neighbours. In this way the first  router  gets its own information  back plus new information about its  neighbour  other neighbour . each  of these neighbours adds  its knowledge and sends the  updated table eon to its own neighbours  and so on.  Eventually every  router in internetwork.

Posted Date: 3/16/2013 3:31:54 AM | Location : United States







Related Discussions:- Sharing information - network layer and routing , Assignment Help, Ask Question on Sharing information - network layer and routing , Get Answer, Expert's Help, Sharing information - network layer and routing Discussions

Write discussion on Sharing information - network layer and routing
Your posts are moderated
Related Questions
Can you define the difference among trusted and untrusted networks?

In connectionless schema, there is no connection required. The source of data includes destination information in data and transmit to the network. Network transmit each data item

The "ipx delay number" command will permit an administrator to alter the default settings. Explain the default settings? Ans) For LAN interfaces, one tick; for WAN interfaces, s

Q. Explain about Mesh Topology? - Dedicated point-to-point links to each other device - n (n-1)/2 links an every device will have n-1 I/O ports - Advantages - Dedic

Reliable  data transfer  over a perfectly reliable channel rdt 1.0 First  all consider  the simplest  care in  which  the underlying  channel  perfectly reliable.  The protoco

MPI contains hundreds of functions, a small subset of which is enough for most practical purposes. We shall talk about some of them in this unit. Functions for MPI Environment:

Q. Security and Reciprocity of RSA? Security and Reciprocity of RSA - Kp and N are issued publicly. - Ks is kept secret. - Since the snooper does not know p and

Create and simulate a network similar to the one shown here, using the NetML system. The network is a little more complex, as depicted at the right. There is an extra node

NETWORK OWNERSHIP:   There are two types in this case: 1. Private Network 2. Public Network

Financial Services Today   financial services are totally depended  on computer network. Application includes credit history searchers foreign exchange and  investment service