Sharing information - network layer and routing , Computer Networking

Assignment Help:

Sharing  information 

To understand  how distance vector routing  works examine the  internet shown in  the  clouds represents local  area network . the  number  inside each cloud that LAN network ID>these LAN  can be  of any  type represented  by the boxes labelled A, B, C, D, E  and F,

Distance vector routing  simplifies  the  routing  process by  assuming  cost  of one  unit for every  link.

Shows the first  step in  the algorithm. The next  boxes  indicate the  relationship  of the  routers. Each  router  sends  its informant on about  internetwork only to  immediate neighbours.

A router  sends its  knowledge to its neighbours . the neighbours  add this  knowledge  to their  own  knowledge and send the whole table to their  own neighbours. In this way the first  router  gets its own information  back plus new information about its  neighbour  other neighbour . each  of these neighbours adds  its knowledge and sends the  updated table eon to its own neighbours  and so on.  Eventually every  router in internetwork.


Related Discussions:- Sharing information - network layer and routing

Describe the architecture of the tcp/ip protocol suite, Problem 1 Descr...

Problem 1 Describe the architecture of the TCP/IP protocol suite Problem 2 Describe the principle of operation of REXEC protocol Problem 3 Describe the concept

Fundamental of network , Fundamental of Network The  concept  of netw...

Fundamental of Network The  concept  of network  is not  new. In simple  it means an interconnected set  of some  objects. For decades we are familiar with the radio,  televi

Disk encryption and block cipher, Suppose AES (or any block cipher) is used...

Suppose AES (or any block cipher) is used to encrypt data. Which mode of encryption covered in class is best suited for each of the following two scenarios and why? If more than on

What is logical link control, What is logical link control? One of two ...

What is logical link control? One of two sublayers of the data link layer of OSI reference model, as explained by the IEEE 802 standard. This sublayer is responsible for mainta

What are three ways to give login access to router, The three ways to give ...

The three ways to give login access to the router are by the Console port, auxiliary port, and virtual terminal (Telnet)

Explain how reducing ineffective taxation, Question: (a) With mobile t...

Question: (a) With mobile telecommunications providing an important engine for growth, continuing to stimulate growth and to ensure mobiles remain affordable for all, will re

What is nos, What is NOS? NOS, or Network Operating System, are special...

What is NOS? NOS, or Network Operating System, are specialized software whose major task is to give network connectivity to a computer in order for it to be able to converse wi

Security, .test a number to be prime number in network security

.test a number to be prime number in network security

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd