Routing table - network layer and routing , Computer Networking

Assignment Help:

Routing Table

A routing  table has columns  for at  three types o information  the network  ID  the cost  and the  ID of the  next  router. The  network  ID is the final  destination of the packet. The cost  is  the number of hops  a packets  must make  to get  there. And  the next  router is the router  to which  a packet  must  be delivered  on its  way  to a particular destination.

The  original  routing  tables for  our sample  internetwork  are show  in this point  the third  column is empty because the only  destination network  identified  are those  attached to the current  router.

No multiple  hop  destination and  therefore  no next  router have been identified. These  basic  tables  are sent out to neighbours. For  example A sends is  routing take  to routers B, F sends E, B send it routing table  to routers C and A  and so on:

When a receives  a routing  from  B it uses the information to update  its own  table. A adjusts  the information  shown B table by  adding  one to  each listed cost. It then  combines  the table  with it own to create a new  more comprehensive  table.

This  process  continues for all routers. Every  router  receives information from  neighbours  and updates its  routing  table. If  there are no more  changes the final  tables  may look like  those shown.


Related Discussions:- Routing table - network layer and routing

Introduction to performance evaluations, INTRODUCTION In this part, th...

INTRODUCTION In this part, the topic of performance evaluation shows those parameters that are devised to calculate the performances of various parallel systems. Achieving the

Explain fddi media, FDDI Media FDDI signifies a 100 Mbps token-passing ...

FDDI Media FDDI signifies a 100 Mbps token-passing dual-ring LAN that uses a fiber-optic transmission medium. Even though it operates at faster speeds FDDI is similar to Tok

Why mac address called physical address, MAC address called Physical addres...

MAC address called Physical address Because it's not changeable

ILab 2: Office Network Expansion, iLab 2: Office Network Expansion ...

iLab 2: Office Network Expansion Connect to the iLab here. Submit your assignment to the Dropbox located on the silver tab at the top of this page. (See "Due Da

Show the tcp/ip and osi similarities, Q. Show the TCP/IP and OSI Similariti...

Q. Show the TCP/IP and OSI Similarities? TCP/IP and OSI Similarities - Both have Layers - Both have Application Layers - Have Comparable Transport and Network Layer

Tqm in design manufacturing, Quality assurance through statistical methods...

Quality assurance through statistical methods is a key component in a manufacturing organization where TQM generally starts by sampling a random selection selection of th

Example programmes for parallel systems-adding element, Example Programmes ...

Example Programmes for Parallel Systems Now we shall complete this with the examples on shared memory programming. Example 13: Adding elements of an array using two proce

Difference among symmetric and asymmetric cryptosystem, what's the differen...

what's the difference among Symmetric and Asymmetric cryptosystem?

Network protocols - computer networks, Network Protocols In computer  ...

Network Protocols In computer  networks  communication  occurs between  the entities in different  systems an entity  is anything  that is  capable  of sending  or receiving

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd