Routing principle - network layer and routing , Computer Networking

Assignment Help:

Routing Principle

The principle  criterion of  successful routing is of course correctness but it not only criterion. You might  prefer to take the most direct route ( the  one that  the least time and uses the least fuel) the  most reliable route (the one  is not likely to be closed by a heavy snowfall) the most scenic route ( the  one that flows pleasant country roads rather than  busy highways) the  least  expensive route ( the  one that follow freeways  rather  than toll roads0  or the safest route ( the one  that avoids the army missile testing  range) in its  most  general form optimal routing involves forwarding a packet from source to destination using the best path.

Routing  is the methods of delivering a message from  source to target ( which  are not  directly  connected )suing  multiple other hosts in the middle to forward the message.

Routers  perform  two things  to deliver the packets to its destination.

a.First is learning  the logical  of the network  to store the path inside the routing  table  to where the traffic should  flow which  called routing.

b.Second  is forwarding those  packets  learned from an inbound interface to the  out  bound interface with  in the  ourter which  is called switching.

The  observation suggest  that an open systems  routing  architecture should.

a.Scale well .

b.Support  many different sub network types and multiple qualities of service.

c.Adapt to topology  changes quickly and efficiently ( i ,e with minimum overhead  and complexity).

d.Provide controls  that facilitate the safe connection of multiple  organizations.

It is not likely  that the  manual administration of static routing tables  will satisfy these  objectives  for  a network  connecting  more than  a few  hundred  systems. A routing  scheme for a large  scale  open  systems  network must  biodynamic adaptive and decentralized, be  capable of supporting multiple paths  offering  different  types of service and provide the  means to establish trust firewalls and security across  multiple  administrations.


Related Discussions:- Routing principle - network layer and routing

Low frequency cut-off of the band-pass, Question Approximately what is ...

Question Approximately what is the low frequency cut-off of the band-pass filter shown in the figure?

Illustrate error detection-simple parity check, Q. Illustrate Error Detecti...

Q. Illustrate Error Detection-Simple Parity Check? Error Detection-Simple Parity Check A redundant bit called as Parity Bit? is added to every data unit. Even Pa

State token ring implementation, Token Ring Implementation Sequence...

Token Ring Implementation Sequence of 150-ohm shielded twisted-pairs sections Output port on every station connected to input port on the next Frame is passed to

How does a token-passing protocol works, How does a Token-Passing Protocol ...

How does a Token-Passing Protocol works? The token-passing protocol relies on a control signal known as the token. A token is a 24-bit packet that circulates throughout the net

What is the purpose of configuration files for servers, Question 1: a) ...

Question 1: a) Give three examples of Shells in Linux. b) Differentiate between the Join command and the Paste command in Linux, use an example to support your answer.

Objectives of performance evaluations, OBJECTIVES After studying this ...

OBJECTIVES After studying this part, you should be able to: Explain the Metrics for Performance Evaluation; Notify about various Parallel System Overheads; Desc

Show the function of signals, Q. Show the Function of Signals? - TD tra...

Q. Show the Function of Signals? - TD transmitted data - RD received data - DSR data set ready Indicate whether DCE is powered on - DTR signifies data termi

Thick ethernet wiring, THICK ETHERNET WIRING:  It needs thick coax cab...

THICK ETHERNET WIRING:  It needs thick coax cable. AUI cable joins from NIC to transceiver. AUI cable take digital signal from NIC to transceiver. The transceiver creates anal

Explain a transaction server, With a transaction server, the client request...

With a transaction server, the client requests remote procedures that reside on the server with an SQL database engine. These remote processes on the server execute a group of SQL

Describe the term disaster management as security threats, Describe the ter...

Describe the term Disaster Management as security threats Making and testing backups regularly could be the simplest and easiest of all the security measures. But a new questio

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd