Routing principle - network layer and routing , Computer Networking

Assignment Help:

Routing Principle

The principle  criterion of  successful routing is of course correctness but it not only criterion. You might  prefer to take the most direct route ( the  one that  the least time and uses the least fuel) the  most reliable route (the one  is not likely to be closed by a heavy snowfall) the most scenic route ( the  one that flows pleasant country roads rather than  busy highways) the  least  expensive route ( the  one that follow freeways  rather  than toll roads0  or the safest route ( the one  that avoids the army missile testing  range) in its  most  general form optimal routing involves forwarding a packet from source to destination using the best path.

Routing  is the methods of delivering a message from  source to target ( which  are not  directly  connected )suing  multiple other hosts in the middle to forward the message.

Routers  perform  two things  to deliver the packets to its destination.

a.First is learning  the logical  of the network  to store the path inside the routing  table  to where the traffic should  flow which  called routing.

b.Second  is forwarding those  packets  learned from an inbound interface to the  out  bound interface with  in the  ourter which  is called switching.

The  observation suggest  that an open systems  routing  architecture should.

a.Scale well .

b.Support  many different sub network types and multiple qualities of service.

c.Adapt to topology  changes quickly and efficiently ( i ,e with minimum overhead  and complexity).

d.Provide controls  that facilitate the safe connection of multiple  organizations.

It is not likely  that the  manual administration of static routing tables  will satisfy these  objectives  for  a network  connecting  more than  a few  hundred  systems. A routing  scheme for a large  scale  open  systems  network must  biodynamic adaptive and decentralized, be  capable of supporting multiple paths  offering  different  types of service and provide the  means to establish trust firewalls and security across  multiple  administrations.


Related Discussions:- Routing principle - network layer and routing

Explain about line coding, Q. Explain about line coding? Line Coding ...

Q. Explain about line coding? Line Coding  Procedure of converting binary data to a digital signal DC Components  Residual dc (direct-current) components or

Describe the datawarehouse and data mining, Question 1: ‘There is an ov...

Question 1: ‘There is an overwhelming imperative for organisations to analyse every bit of information they can extract from their huge data warehouses for competitive advant

Hyper text transfer protocols ( http), Hyper  Text Transfer Protocols ( HT...

Hyper  Text Transfer Protocols ( HTTP) The Hyper text  protocols ( HTTP) is at  the heart  of the  web. If a browser  developer follows  the rules  of the HTTP, the  browser w

What are the data units at dissimilar layers of the tcp / ip, What are the ...

What are the data units at dissimilar layers of the TCP / IP protocol suite? The data unit formed at the application layer is called a message, at the transport layer the data

User datagram protocol, A UDP header does not have Sequence number and Ackn...

A UDP header does not have Sequence number and Acknowledgement number fields. Is it an advantage or a disadvantage? Explain your answer in detail. User Datagram Protocol Th

Dns records and messages - application layer, DNS Records  and Messages ...

DNS Records  and Messages Two types  of records  are used DNS. The  question records  are used in the question  section of the query and response  messages. The resource  reco

What is a jam signal, What is a jam signal A jam signal is broadcasts ...

What is a jam signal A jam signal is broadcasts to network by the transmitting stations that detected the collision to ensure that all stations know of the collision. Every st

Commands and responses - application layer, Commands SMTP uses comma...

Commands SMTP uses commands  and response  to transfer  message between a client  and a  server.  Each  commands  or reply  is terminated by a two character ( carriage re

Concept of permutation network, Concept Of Permutation Network In permu...

Concept Of Permutation Network In permutation interconnection networks the information replace requires data transfer from input set of nodes to output set of nodes and likely

Verify vlans and trunking - ccna, Verify VLANs and trunking. Use the sh...

Verify VLANs and trunking. Use the show ip interface trunk command on S1 and the show vlan command on S2 to determine that the switches are trunking correctly and the proper VL

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd