Question

In: Computer Science

Describe three different sources a router can use to put/maintain the information contained in the routing...

Describe three different sources a router can use to put/maintain the information contained in the routing table.

Solutions

Expert Solution

Routing lTable

The routers have an inner memory called RAM. The all the information a routing table collect will be stored in RAM of routers. lA lrouting ltable lrecognizes lthe lpath lfor la lpacket lby llearning lthe lIP laddress and other related information from the table and forwards the packet to the desired target or network..

The lfollowing lare lthe lentities lhaving lin la lrouting ltable:

IP laddresses land lSubnet lmask lof lthe target lhost land lthe lnetwork
IP addresses of all those routers which are required to reach the target network.
Extrovert interface information

There lare lthree lvarious lprocedures lfor put/maintain lrouting ltable:

  • Directly lconnected lsubnets
  • Static lrouting
  • Dynamic lrouting

Connected lRoutes: lIn lthe lideal lmode, lall lthe linterfaces lof lthe lrouters lwill lremain lin l‘down’ lstate. lSo lthe linterfaces lon lwhich luser lgoing lto limplement lany lconfiguration, lfirstly lchange lthe lstate lfrom l‘down’ lto l‘up’. lNext lstep lof setting lwill lbe lassigning lthe lIP laddresses lto lall linterfaces.

Now lthe lrouter lwill lbe lsmart lenough lto lroute lthe ldata lpackets lto la ldestination lnetwork lvia ldirectly lconnected lactive linterfaces. lThe lsubnets lare lalso ladded lin lthe lrouting ltable.

Static lRouting: lBy lusing lstatic lrouting, la lrouter lcan lgather lthe lroute lto lthe lfar lend lnetwork lthat lis lnot lphysically lor lstraightly lconnected lto lone lof lits linterfaces.

Routing lis ldone lmanually lbe lrunning la lparticular lcommand lwhich lis lglobally lused.

Dynamic iRouting: iThis itype iof irouting iworks iwith iat ileast ione itype iof irouting iprotocol iis ifacilitated iwith iit. iA irouting iprotocol iis ipracticed iby irouters iso ithat ithey ican ishare ithe irouting iinformation iamong ithem. iBy ithis iprocess, ieach iof ithe irouters iin ithe inetwork ican ilearn ithat iinformation iand iwill ideploy iit iin ibuilding iup itheir iown irouting itables.

Routing iprotocol iworks iin isuch ia iway iso ithat iif ia ilink igoes idown ion iwhich iit iwas irouting idata, iit idynamically ichange itheir ipath ifor irouting ipacket iwhich iin iturn imakes ithem ifault-resistant.

Dynamic irouting ialso idoesn’t ineed iany imanual iconfiguration iwhich isaves ithe itime iand iadministration iload.

We ionly ineed ito idefine ithe iroutes iand itheir icorresponding isubnets iwhich irouter iwill ibe iusing iand ithe irest iis itaken icare iby irouting iprotocols.


Related Solutions

describe following about the router d. Border router e. an exterior router f. Describe a Routing...
describe following about the router d. Border router e. an exterior router f. Describe a Routing table g. What is the best path, and how is it defined? Give an example h. Describe the following commands and give an example of its use • Route • Netstat • tracert
Discuss issues pertaining routing algorithm in Wireless Sensor Networks. State and describe three routing algorithms with...
Discuss issues pertaining routing algorithm in Wireless Sensor Networks. State and describe three routing algorithms with relevant example of their applications.
List three different digital artifacts contained within a Windows operating system and how they can be...
List three different digital artifacts contained within a Windows operating system and how they can be used by a forensics analyst during a digital forensics investigation.
This simulation question available sources is based upon a true set of facts. The information contained...
This simulation question available sources is based upon a true set of facts. The information contained in the simulation question was What is the Relationship Between the Fraud Triangle and Financial Statement Fraud? - Required First, search the Internet or refer to textbooks to learn as much as you can about the Fraud Triangle. Then, answer the following: 2. How can the Fraud Triangle detect/prevent financial statement fraud? Discuss how each of the three elements of the Fraud Triangle can...
Describe the sources of information for financial statement analysis.
Describe the sources of information for financial statement analysis.
the sources of energy loss contained in fluid power system can include A) fluid viscosity B)...
the sources of energy loss contained in fluid power system can include A) fluid viscosity B) the configuration of valves and fittings C) piping materials D) all of the above
A range of different types and sources of data and information will be required for budgeting...
A range of different types and sources of data and information will be required for budgeting and forecasting. Identify and list four types and sources of data and explain how the data is applied.
Describe the three different levels of calcium release that can occur in a cell with respect...
Describe the three different levels of calcium release that can occur in a cell with respect to [IP3] and receptors opening
There are five different types of control methods that managers can utilize to maintain control. These...
There are five different types of control methods that managers can utilize to maintain control. These are bureaucratic, concertive, objective, normative and self-control (self-management). Please compare and contrast the different types of control methods. Please describe which method you think is the most effective and which one is the least effective. Which method would you prefer to use as a manager? Does this differ from which method you would like to work under as an employee?
Describe the different types of magnets that you can buy and use, as well as their properties.
  Describe the different types of magnets that you can buy and use, as well as their properties.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT