Sharing information - network layer and routing , Computer Networking

Assignment Help:

Sharing  information 

To understand  how distance vector routing  works examine the  internet shown in  the  clouds represents local  area network . the  number  inside each cloud that LAN network ID>these LAN  can be  of any  type represented  by the boxes labelled A, B, C, D, E  and F,

Distance vector routing  simplifies  the  routing  process by  assuming  cost  of one  unit for every  link.

Shows the first  step in  the algorithm. The next  boxes  indicate the  relationship  of the  routers. Each  router  sends  its informant on about  internetwork only to  immediate neighbours.

A router  sends its  knowledge to its neighbours . the neighbours  add this  knowledge  to their  own  knowledge and send the whole table to their  own neighbours. In this way the first  router  gets its own information  back plus new information about its  neighbour  other neighbour . each  of these neighbours adds  its knowledge and sends the  updated table eon to its own neighbours  and so on.  Eventually every  router in internetwork.


Related Discussions:- Sharing information - network layer and routing

Multi tasking environment, Multi Tasking Environment Multi tasking exp...

Multi Tasking Environment Multi tasking exploits parallelism by: 1)  Concurrently using the multiple functional units 2)  Pipelining functional units are pipe line toget

Name the connecting devices of bridges, Connecting Devices of bridges -...

Connecting Devices of bridges - Five kinds: - Repeaters - Hubs - Bridges - Two- and three-layer switches - Repeaters and hubs - layer one of Internet model -

What is a pseudo TTY, What is a pseudo tty? A pseudo tty or false termi...

What is a pseudo tty? A pseudo tty or false terminal enables external machines to connect by Telnet or rlogin. Without a pseudo tty, no connection can take place.

When it comes to networking what are rights, When it comes to networking, w...

When it comes to networking, what are rights? Rights refer to the authorized permission to perform exact actions on the network. Every user on the network can be assigned indiv

Determine the connection to backbone lan, Connection to backbone LAN In...

Connection to backbone LAN In most cases, interconnection with stations on a wired backbone LAN is needed. For infrastructure wireless LANs, this is simply accomplished by the

Task of changing the ip address, 1. Bob has been given the task of changing...

1. Bob has been given the task of changing the IP address and enabling telnet access on a CISCO 2950 enterprise switch. The current IP address is 10.10.10.2/8 the new IP address

Improvements for the wireline lan infrastructure, 5. CSMA/CD based Ethernet...

5. CSMA/CD based Ethernet LANs in various sites and Frame Relay (FR) service to connect them together. You want to make a difference in the organization by upgrading the LANs to be

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd