Routing principle - network layer and routing , Computer Networking

Assignment Help:

Routing Principle

The principle  criterion of  successful routing is of course correctness but it not only criterion. You might  prefer to take the most direct route ( the  one that  the least time and uses the least fuel) the  most reliable route (the one  is not likely to be closed by a heavy snowfall) the most scenic route ( the  one that flows pleasant country roads rather than  busy highways) the  least  expensive route ( the  one that follow freeways  rather  than toll roads0  or the safest route ( the one  that avoids the army missile testing  range) in its  most  general form optimal routing involves forwarding a packet from source to destination using the best path.

Routing  is the methods of delivering a message from  source to target ( which  are not  directly  connected )suing  multiple other hosts in the middle to forward the message.

Routers  perform  two things  to deliver the packets to its destination.

a.First is learning  the logical  of the network  to store the path inside the routing  table  to where the traffic should  flow which  called routing.

b.Second  is forwarding those  packets  learned from an inbound interface to the  out  bound interface with  in the  ourter which  is called switching.

The  observation suggest  that an open systems  routing  architecture should.

a.Scale well .

b.Support  many different sub network types and multiple qualities of service.

c.Adapt to topology  changes quickly and efficiently ( i ,e with minimum overhead  and complexity).

d.Provide controls  that facilitate the safe connection of multiple  organizations.

It is not likely  that the  manual administration of static routing tables  will satisfy these  objectives  for  a network  connecting  more than  a few  hundred  systems. A routing  scheme for a large  scale  open  systems  network must  biodynamic adaptive and decentralized, be  capable of supporting multiple paths  offering  different  types of service and provide the  means to establish trust firewalls and security across  multiple  administrations.


Related Discussions:- Routing principle - network layer and routing

Concurrently read exclusively write (crew), This  is one of the models base...

This  is one of the models based on PRAM. In this, the processors access the memory location parallel for reading while exclusively for writing operations. In the algorithm which u

Which type for communication switch do, In case of any new event switch do ...

In case of any new event switch do broadcast, after that always do Unicast.

Quality of service, Networks are more frequently being prepared to allow sp...

Networks are more frequently being prepared to allow specification of the quality of service needed by users. For example: - a typical voice telephone call may give a QoS para

Explain how would pipeline the four pairs of statements, 3.  Explain how yo...

3.  Explain how you would pipeline the four following pairs of statements.  (4×5 points) a)  add $t0, $s0, $s1 beq $s1,$s2, 300 b)  add $t2, $t0, $t1 sw $t3, 36($t2) c)

Base 64 encoding, Base 64 Encoding The Simple Mail Transfer Protocol (...

Base 64 Encoding The Simple Mail Transfer Protocol (SMTP) is a protocol used on the Internet for sending email. When you send an email, your mail client establishes an SMTP co

Explain about error detection, Q. Explain about Error Detection? Data c...

Q. Explain about Error Detection? Data can be corrupted during transmission because of accidents, Storms, sudden increase in electricity and voltage / decrease in signal power

Des key, Assume the following 64-bit DES key (expressed in hexadecimal): FE...

Assume the following 64-bit DES key (expressed in hexadecimal): FEFE FEFE FEFE FEFE (a) What is the term for such a key? (b) State the value of each of the 48-bit round keys

Determine the benefits of security on internet or intranet, Determine the b...

Determine the benefits of security on internet or intranet Security has long been seen as a major threatening point in the implementation of the Internet or of Intranet technolog

Features of transmission control protocol, The major features of TCP are fo...

The major features of TCP are following: Reliability : TCP ensures that any data sent by a sender arrives at the destination as it was sent. There cannot be any data loss or mo

Explain the working of transceivers, Explain the working of Transceivers ...

Explain the working of Transceivers Transceivers are used to connect nodes to the several Ethernet media. Most computers and network interface cards having a built-in 10BaseT o

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd