SlideShare a Scribd company logo
ADVANCED COMPUTER
NETWORKS
PRESENTATION
1
ROUTING TECHNIQUES TABLE TYPE
BY
UMAR DANJUMA MAIWADA
2
TABLE OF CONTENTS
3
1) INTRODUCTION ……………………………………………………………………. 4
2) ROUTING ………………………………………………………………………………. 5
3) ROUTING TABLE ……………………………………………………………………. 6
4) CATEGORIES OF ROUTING TABLE ………………………………………….. 8
 Static Routing Table ……………………………………………………….. 8
 Dynamic Routing Table ………………………………………………….. 9
5) ROUTING TECHNIQUES ……………………………………………………….. 10
 Unicast Routing ……………………………………………………………… 10
 Multicast Routing ……………………………………………………………. 14
6) CONCLUSION ………………………………………………………………………… 17
7) REFERENCES ………………………………………………………………………… 18
INTRODUCTION
4
 ROUTE
 ROUTER
 ROUTING
 ROUTING TABLE
 STATIC
 DYNAMIC
 UNICAST
 MULTICAST
ROUTING
5
 It is a method of finding paths from origin to destination in a
network.
 It is the process of moving a packet of data from source to
destination. Routing is usually performed by a dedicated
device called a router.
 Routing is a key feature of the Internet because it enables
messages to pass from one computer to another and
eventually reach the target machine.
ROUTING TABLE
6
 It is a data table stored in a router or a networked computer
that lists the routes to particular network destination.
 A routing table uses the same idea that one does when using a
map in package delivery. Whenever a node needs to send data
to another node on a network, it must first know where to
send it. If the node cannot directly connect to the destination
node.
 A routing table is a data file in RAM that is used to store route
information about directly connected and remote networks.
~Mask – subnet mask.
~Network Address – address of the final destination of a packet.
~Next-hop – address of the next router to receive the packet.
~Interface – name of the interface.
7
CATEGORIES OF ROUTIG TABLE
8
1) STATIC ROUTING TABLE
 It is a form of routing that occurs when a router uses a
manually-configured routing entry, rather than information
from a dynamic routing traffic.
 In many cases, static routes are manually configured by a
network administrator by adding in entries into a routing
table, though this may not always be the case.
 static routes are fixed and do not change if the network is changed
or reconfigured. Static routing is often used to help transfer routing
information from one routing protocol to another
2) DYNAMIC ROUTING TABLE
9
 It is a networking technique that provides optimal data
routing. The router delivers and receives the routing
messages on the router interfaces.
 Whenever a router finds a change in topology, the routing
protocol advertises this topology change to other routers.
 Dynamic routing is less secure than static routing. It
describes the capability of a system, through which routes
are characterized by their destination.
ROUTING TECHNIQUES
10
A. UNICAST ROUTING
 Unicast routing is the process of forwarding unicasted traffic
from a source to a destination on an internetwork.
 Unicasted traffic is destined for a unique address. The host
and the destination addresses in the IP datagram are the
unicast address assigned to the host.
 A unicast packet starts from the source and passes through
routers to reach the destination. Unicast transmission, in
which a packet is sent from a single source to a specified
destination.
11
12
INTRA AND INTERDOMAIN ROUTING – Intra domain routing
is the routing within (inside) a group of networks. While
Inter domain routing is the routing outside a group of
networks (communication between two or more group of
networks).
MULTIPLE UNICAST – several packets starts from the source.
Many copies will travel between the routers, each with a
different destination address and sends them one-by-one.
13
UNICAST ROUTING PROTOCOLS
 Distance Vector Routing e.g. RIP
 Link State Routing e.g. OSPF
 Path Vector Routing e.g. BGP
14
B. MULTICAST ROUTING
 Multicast routing is a method of sending Internet Protocol
(IP) datagrams to a group of interested receivers in a single
transmission.
 A multicast datagram is delivered to destination group
members with the same “best-effort” reliability as a
standard unicast IP datagram.
 Multicast routers execute a multicast routing protocol to
define delivery paths that enable the forwarding of
multicast datagrams across an internetwork.
15
16
APPLICATIONS OF MULTICASTING
 Access to Distributed Databases
 Distance Learning
 Teleconferencing
MULTICAST ROUTING PROTOCOLS
i. Source-Based Tree
 MOSPF
 DVMRP
 PIM-DM
ii. Group-Shared Tree
 CBT
 PIM-SM
17
CONCLUSION
Routing has been discussed with routing table, for easy
understanding of how packets are forwarded from a source to a
destination. The presentation shows you how routing occurs
despite the fact that the protocols have not been discussed but
atleast the introductory aspect have been covered.
I believed my colleagues will give a detail about the protocols
and in that case you will understand in full what happens during
routing using the protocols.
Lastly, references have been provided for easy search and more
understanding were necessary.
REFERENCES
18
[1]. Aaron Balchunas. (2007). The Cisco IOS v1.22.
[2]. Andrew Tanenbaum, S. (2011). Computer Networks (4th
edition), Ph. D from the university of California.
[3]. Angelos Stavrou. (2007). Cisco Inter-network Operating
System (IOS), a short guide for the Net Admin.
[4]. Barry, G. B. (2007). Computer Systems and Networks.
[5]. Behrouz, A. (2002). Data communication and Networks
[6]. Behrouz A. Forouzan (2012). Data Communication and
Networking (5th Edition).
[7]. Dana Madison, E., & Aaron Sanders, D. (2001). Data
Communications Concepts.
[8]. David Wetherall, J. (2014).WA: computer Networks (5th
edition). University of Washington Seattle.
[9]. Larry L. Peterson & Bruce S. Davie. (2007). Computer
Networks, a system approach.
[10]. Todd, L. (2007). CCNA Study guide for networking (6th Edition).
[11]. Tom, S. (2002). Encyclopedia of Networking and Data
Communication.
[12]. William, S. (2007). Data and Computer Communications (8th
Edition).
19
THANK YOU
20

More Related Content

What's hot

BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKS
KABILESH RAMAR
 
Routing Techniques
Routing TechniquesRouting Techniques
Routing Techniques
Nishant Munjal
 
Routing
RoutingRouting
Design and Implementation of Dynamic Routing in Wireless Networks
Design and Implementation of Dynamic Routing in Wireless NetworksDesign and Implementation of Dynamic Routing in Wireless Networks
Design and Implementation of Dynamic Routing in Wireless Networks
Satish Reddy
 
Day 4 LAYER 2 SWITCHING
Day 4 LAYER 2 SWITCHINGDay 4 LAYER 2 SWITCHING
Day 4 LAYER 2 SWITCHING
anilinvns
 
Routing table and routing algorithms
Routing table and routing algorithmsRouting table and routing algorithms
Routing table and routing algorithmslavanyapathy
 
Link State Protocol
Link State ProtocolLink State Protocol
Link State Protocol
Jignesh Patel
 
Day 2 IP ROUTING
Day 2 IP ROUTINGDay 2 IP ROUTING
Day 2 IP ROUTING
anilinvns
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
danishrafiq
 
Dynamic Routing All Algorithms, Working And Basics
Dynamic Routing All Algorithms, Working And BasicsDynamic Routing All Algorithms, Working And Basics
Dynamic Routing All Algorithms, Working And Basics
Harsh Mehta
 
Week16 lec1
Week16 lec1Week16 lec1
Week16 lec1
syedhaiderraza
 
Routing ppt
Routing pptRouting ppt
Routing ppt
ArpiSaxena1
 
Routing Protocols
Routing ProtocolsRouting Protocols
Routing Protocols
NetProtocol Xpert
 
Week13 lec2
Week13 lec2Week13 lec2
Week13 lec2
syedhaiderraza
 
Week15 lec1
Week15 lec1Week15 lec1
Week15 lec1
syedhaiderraza
 
Week13 lec1
Week13 lec1Week13 lec1
Week13 lec1
syedhaiderraza
 

What's hot (20)

BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKS
 
Routing Techniques
Routing TechniquesRouting Techniques
Routing Techniques
 
Routing
RoutingRouting
Routing
 
Design and Implementation of Dynamic Routing in Wireless Networks
Design and Implementation of Dynamic Routing in Wireless NetworksDesign and Implementation of Dynamic Routing in Wireless Networks
Design and Implementation of Dynamic Routing in Wireless Networks
 
Day 4 LAYER 2 SWITCHING
Day 4 LAYER 2 SWITCHINGDay 4 LAYER 2 SWITCHING
Day 4 LAYER 2 SWITCHING
 
Routing table and routing algorithms
Routing table and routing algorithmsRouting table and routing algorithms
Routing table and routing algorithms
 
Routing
RoutingRouting
Routing
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
 
Link State Protocol
Link State ProtocolLink State Protocol
Link State Protocol
 
Day 2 IP ROUTING
Day 2 IP ROUTINGDay 2 IP ROUTING
Day 2 IP ROUTING
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Dynamic Routing All Algorithms, Working And Basics
Dynamic Routing All Algorithms, Working And BasicsDynamic Routing All Algorithms, Working And Basics
Dynamic Routing All Algorithms, Working And Basics
 
Week16 lec1
Week16 lec1Week16 lec1
Week16 lec1
 
Routing ppt
Routing pptRouting ppt
Routing ppt
 
Routing Protocols
Routing ProtocolsRouting Protocols
Routing Protocols
 
Week13 lec2
Week13 lec2Week13 lec2
Week13 lec2
 
Routing
RoutingRouting
Routing
 
Week15 lec1
Week15 lec1Week15 lec1
Week15 lec1
 
Ccna day4
Ccna day4Ccna day4
Ccna day4
 
Week13 lec1
Week13 lec1Week13 lec1
Week13 lec1
 

Viewers also liked

Rpc Case Studies (Distributed computing)
Rpc Case Studies (Distributed computing)Rpc Case Studies (Distributed computing)
Rpc Case Studies (Distributed computing)Sri Prasanna
 
Zaharaddeen karami lawal distance vector routing
Zaharaddeen karami lawal distance vector routingZaharaddeen karami lawal distance vector routing
Zaharaddeen karami lawal distance vector routing
Klawal13
 
Sun RPC (Remote Procedure Call)
Sun RPC (Remote Procedure Call)Sun RPC (Remote Procedure Call)
Sun RPC (Remote Procedure Call)
Peter R. Egli
 
network filesystem briefs
network filesystem briefsnetwork filesystem briefs
network filesystem briefsbergwolf
 
Java rmi
Java rmiJava rmi
Java rmi
Tanmoy Barman
 
RPC: Remote procedure call
RPC: Remote procedure callRPC: Remote procedure call
RPC: Remote procedure call
Sunita Sahu
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layerNitesh Singh
 
RPC
RPCRPC
remote procedure calls
  remote procedure calls  remote procedure calls
remote procedure callsAshish Kumar
 
TCP/IP – Transmission Control Protocol/ Internet Protocol
TCP/IP – Transmission Control Protocol/ Internet ProtocolTCP/IP – Transmission Control Protocol/ Internet Protocol
TCP/IP – Transmission Control Protocol/ Internet Protocol
We Learn - A Continuous Learning Forum from Welingkar's Distance Learning Program.
 
Network Security
Network SecurityNetwork Security
Network Security
MAJU
 
Types of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design ToolsTypes of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design Tools
Surabhi Gosavi
 

Viewers also liked (12)

Rpc Case Studies (Distributed computing)
Rpc Case Studies (Distributed computing)Rpc Case Studies (Distributed computing)
Rpc Case Studies (Distributed computing)
 
Zaharaddeen karami lawal distance vector routing
Zaharaddeen karami lawal distance vector routingZaharaddeen karami lawal distance vector routing
Zaharaddeen karami lawal distance vector routing
 
Sun RPC (Remote Procedure Call)
Sun RPC (Remote Procedure Call)Sun RPC (Remote Procedure Call)
Sun RPC (Remote Procedure Call)
 
network filesystem briefs
network filesystem briefsnetwork filesystem briefs
network filesystem briefs
 
Java rmi
Java rmiJava rmi
Java rmi
 
RPC: Remote procedure call
RPC: Remote procedure callRPC: Remote procedure call
RPC: Remote procedure call
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layer
 
RPC
RPCRPC
RPC
 
remote procedure calls
  remote procedure calls  remote procedure calls
remote procedure calls
 
TCP/IP – Transmission Control Protocol/ Internet Protocol
TCP/IP – Transmission Control Protocol/ Internet ProtocolTCP/IP – Transmission Control Protocol/ Internet Protocol
TCP/IP – Transmission Control Protocol/ Internet Protocol
 
Network Security
Network SecurityNetwork Security
Network Security
 
Types of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design ToolsTypes of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design Tools
 

Similar to Routing Technique Table Type by Umar danjuma maiwada.ppt

Network Performance Analysis of Dynamic Routing Protocols for Real Time Appl...
Network Performance Analysis of Dynamic Routing Protocols for  Real Time Appl...Network Performance Analysis of Dynamic Routing Protocols for  Real Time Appl...
Network Performance Analysis of Dynamic Routing Protocols for Real Time Appl...
IJMER
 
Chapter Four - Network Layer.pptx
Chapter Four - Network Layer.pptxChapter Four - Network Layer.pptx
Chapter Four - Network Layer.pptx
GirT2
 
OSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil NembangOSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil NembangAnil Nembang
 
Routing table : Notes
Routing table : NotesRouting table : Notes
Routing table : Notes
Subhajit Sahu
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
N.Jagadish Kumar
 
CSC427_Week_11.pdf
CSC427_Week_11.pdfCSC427_Week_11.pdf
CSC427_Week_11.pdf
muazumuhammad6
 
Network the 4th layer
Network the 4th layerNetwork the 4th layer
Network the 4th layer
kachbourimed
 
Evaluating the performance of manet routing protocols
Evaluating the performance of manet routing protocolsEvaluating the performance of manet routing protocols
Evaluating the performance of manet routing protocolsIAEME Publication
 
10.1.1.258.7234
10.1.1.258.723410.1.1.258.7234
10.1.1.258.7234
شيماء شقيرة
 
Internal Architecture of Junction Based Router
Internal Architecture of Junction Based RouterInternal Architecture of Junction Based Router
Internal Architecture of Junction Based Router
Editor IJCATR
 
Internal Architecture of Junction Based Router
Internal Architecture of Junction Based Router Internal Architecture of Junction Based Router
Internal Architecture of Junction Based Router
Editor IJCATR
 
Internal Architecture of Junction Based Router
Internal Architecture of Junction Based RouterInternal Architecture of Junction Based Router
Internal Architecture of Junction Based Router
Editor IJCATR
 
Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...
Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...
Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...
theijes
 
Internal Architecture of Junction Based Router
Internal Architecture of Junction Based RouterInternal Architecture of Junction Based Router
Internal Architecture of Junction Based Router
Editor IJCATR
 
Fo35991995
Fo35991995Fo35991995
Fo35991995
IJERA Editor
 
Adhoc Sensor Networks1.pptx
Adhoc Sensor Networks1.pptxAdhoc Sensor Networks1.pptx
Adhoc Sensor Networks1.pptx
kapss043
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesVamsi Krishna Kalavala
 

Similar to Routing Technique Table Type by Umar danjuma maiwada.ppt (20)

Arun project-Final
Arun project-FinalArun project-Final
Arun project-Final
 
Network Performance Analysis of Dynamic Routing Protocols for Real Time Appl...
Network Performance Analysis of Dynamic Routing Protocols for  Real Time Appl...Network Performance Analysis of Dynamic Routing Protocols for  Real Time Appl...
Network Performance Analysis of Dynamic Routing Protocols for Real Time Appl...
 
Chapter Four - Network Layer.pptx
Chapter Four - Network Layer.pptxChapter Four - Network Layer.pptx
Chapter Four - Network Layer.pptx
 
OSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil NembangOSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil Nembang
 
Routing table : Notes
Routing table : NotesRouting table : Notes
Routing table : Notes
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
CSC427_Week_11.pdf
CSC427_Week_11.pdfCSC427_Week_11.pdf
CSC427_Week_11.pdf
 
Network the 4th layer
Network the 4th layerNetwork the 4th layer
Network the 4th layer
 
Evaluating the performance of manet routing protocols
Evaluating the performance of manet routing protocolsEvaluating the performance of manet routing protocols
Evaluating the performance of manet routing protocols
 
10.1.1.258.7234
10.1.1.258.723410.1.1.258.7234
10.1.1.258.7234
 
Internal Architecture of Junction Based Router
Internal Architecture of Junction Based RouterInternal Architecture of Junction Based Router
Internal Architecture of Junction Based Router
 
Internal Architecture of Junction Based Router
Internal Architecture of Junction Based Router Internal Architecture of Junction Based Router
Internal Architecture of Junction Based Router
 
Internal Architecture of Junction Based Router
Internal Architecture of Junction Based RouterInternal Architecture of Junction Based Router
Internal Architecture of Junction Based Router
 
Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...
Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...
Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...
 
Internal Architecture of Junction Based Router
Internal Architecture of Junction Based RouterInternal Architecture of Junction Based Router
Internal Architecture of Junction Based Router
 
Fo35991995
Fo35991995Fo35991995
Fo35991995
 
Adhoc Sensor Networks1.pptx
Adhoc Sensor Networks1.pptxAdhoc Sensor Networks1.pptx
Adhoc Sensor Networks1.pptx
 
Routing basic
Routing basicRouting basic
Routing basic
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notes
 

More from umardanjumamaiwada

Seminar Information Protection & Computer Security (Cryptography).pptx
Seminar Information Protection & Computer Security  (Cryptography).pptxSeminar Information Protection & Computer Security  (Cryptography).pptx
Seminar Information Protection & Computer Security (Cryptography).pptx
umardanjumamaiwada
 
Oop using JAVA
Oop using JAVAOop using JAVA
Oop using JAVA
umardanjumamaiwada
 
C++
C++ C++
Computer hardware
Computer hardware Computer hardware
Computer hardware
umardanjumamaiwada
 
2javascript web programming with JAVA script
2javascript web programming with JAVA script2javascript web programming with JAVA script
2javascript web programming with JAVA script
umardanjumamaiwada
 
1 web programming
1 web programming1 web programming
1 web programming
umardanjumamaiwada
 
0 csc 3311 slide internet programming
0 csc 3311 slide internet programming0 csc 3311 slide internet programming
0 csc 3311 slide internet programming
umardanjumamaiwada
 
0 lecture 6 wp wireless protocol
0 lecture 6 wp wireless protocol0 lecture 6 wp wireless protocol
0 lecture 6 wp wireless protocol
umardanjumamaiwada
 
0 lecture 5 wp wireless protocol
0 lecture 5 wp wireless protocol0 lecture 5 wp wireless protocol
0 lecture 5 wp wireless protocol
umardanjumamaiwada
 
0 lecture 4 wp wireless protocol
0 lecture 4 wp wireless protocol0 lecture 4 wp wireless protocol
0 lecture 4 wp wireless protocol
umardanjumamaiwada
 
0 lecture 3 wp wireless protocol
0 lecture 3 wp wireless protocol0 lecture 3 wp wireless protocol
0 lecture 3 wp wireless protocol
umardanjumamaiwada
 
0 lecture 2 wp wireless protocol
0 lecture 2 wp wireless protocol0 lecture 2 wp wireless protocol
0 lecture 2 wp wireless protocol
umardanjumamaiwada
 
0 lecture 1 wp wireless protocol
0 lecture 1 wp wireless protocol0 lecture 1 wp wireless protocol
0 lecture 1 wp wireless protocol
umardanjumamaiwada
 
lecture 5
 lecture 5 lecture 5
lecture 5
umardanjumamaiwada
 
lecture 4
 lecture 4 lecture 4
lecture 4
umardanjumamaiwada
 
lecture 3
 lecture 3  lecture 3
lecture 3
umardanjumamaiwada
 
lecture 2
 lecture 2 lecture 2
lecture 2
umardanjumamaiwada
 
lecture 1
 lecture 1 lecture 1
lecture 1
umardanjumamaiwada
 
lecture 6
 lecture 6 lecture 6
lecture 6
umardanjumamaiwada
 
lecture 5
 lecture 5 lecture 5
lecture 5
umardanjumamaiwada
 

More from umardanjumamaiwada (20)

Seminar Information Protection & Computer Security (Cryptography).pptx
Seminar Information Protection & Computer Security  (Cryptography).pptxSeminar Information Protection & Computer Security  (Cryptography).pptx
Seminar Information Protection & Computer Security (Cryptography).pptx
 
Oop using JAVA
Oop using JAVAOop using JAVA
Oop using JAVA
 
C++
C++ C++
C++
 
Computer hardware
Computer hardware Computer hardware
Computer hardware
 
2javascript web programming with JAVA script
2javascript web programming with JAVA script2javascript web programming with JAVA script
2javascript web programming with JAVA script
 
1 web programming
1 web programming1 web programming
1 web programming
 
0 csc 3311 slide internet programming
0 csc 3311 slide internet programming0 csc 3311 slide internet programming
0 csc 3311 slide internet programming
 
0 lecture 6 wp wireless protocol
0 lecture 6 wp wireless protocol0 lecture 6 wp wireless protocol
0 lecture 6 wp wireless protocol
 
0 lecture 5 wp wireless protocol
0 lecture 5 wp wireless protocol0 lecture 5 wp wireless protocol
0 lecture 5 wp wireless protocol
 
0 lecture 4 wp wireless protocol
0 lecture 4 wp wireless protocol0 lecture 4 wp wireless protocol
0 lecture 4 wp wireless protocol
 
0 lecture 3 wp wireless protocol
0 lecture 3 wp wireless protocol0 lecture 3 wp wireless protocol
0 lecture 3 wp wireless protocol
 
0 lecture 2 wp wireless protocol
0 lecture 2 wp wireless protocol0 lecture 2 wp wireless protocol
0 lecture 2 wp wireless protocol
 
0 lecture 1 wp wireless protocol
0 lecture 1 wp wireless protocol0 lecture 1 wp wireless protocol
0 lecture 1 wp wireless protocol
 
lecture 5
 lecture 5 lecture 5
lecture 5
 
lecture 4
 lecture 4 lecture 4
lecture 4
 
lecture 3
 lecture 3  lecture 3
lecture 3
 
lecture 2
 lecture 2 lecture 2
lecture 2
 
lecture 1
 lecture 1 lecture 1
lecture 1
 
lecture 6
 lecture 6 lecture 6
lecture 6
 
lecture 5
 lecture 5 lecture 5
lecture 5
 

Recently uploaded

Tom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issueTom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issue
amekonnen
 
Burning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdfBurning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdf
kkirkland2
 
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie WellsCollapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Rosie Wells
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
Faculty of Medicine And Health Sciences
 
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AwangAniqkmals
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
faizulhassanfaiz1670
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
Howard Spence
 
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Dutch Power
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Access Innovations, Inc.
 
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Dutch Power
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
eCommerce Institute
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
Sebastiano Panichella
 
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
SkillCertProExams
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
khadija278284
 
Gregory Harris - Cycle 2 - Civics Presentation
Gregory Harris - Cycle 2 - Civics PresentationGregory Harris - Cycle 2 - Civics Presentation
Gregory Harris - Cycle 2 - Civics Presentation
gharris9
 
Gregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptxGregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptx
gharris9
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Sebastiano Panichella
 
2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf
Frederic Leger
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Sebastiano Panichella
 

Recently uploaded (19)

Tom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issueTom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issue
 
Burning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdfBurning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdf
 
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie WellsCollapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
 
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
 
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
 
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
 
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
 
Gregory Harris - Cycle 2 - Civics Presentation
Gregory Harris - Cycle 2 - Civics PresentationGregory Harris - Cycle 2 - Civics Presentation
Gregory Harris - Cycle 2 - Civics Presentation
 
Gregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptxGregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptx
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
 
2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
 

Routing Technique Table Type by Umar danjuma maiwada.ppt

  • 2. ROUTING TECHNIQUES TABLE TYPE BY UMAR DANJUMA MAIWADA 2
  • 3. TABLE OF CONTENTS 3 1) INTRODUCTION ……………………………………………………………………. 4 2) ROUTING ………………………………………………………………………………. 5 3) ROUTING TABLE ……………………………………………………………………. 6 4) CATEGORIES OF ROUTING TABLE ………………………………………….. 8  Static Routing Table ……………………………………………………….. 8  Dynamic Routing Table ………………………………………………….. 9 5) ROUTING TECHNIQUES ……………………………………………………….. 10  Unicast Routing ……………………………………………………………… 10  Multicast Routing ……………………………………………………………. 14 6) CONCLUSION ………………………………………………………………………… 17 7) REFERENCES ………………………………………………………………………… 18
  • 4. INTRODUCTION 4  ROUTE  ROUTER  ROUTING  ROUTING TABLE  STATIC  DYNAMIC  UNICAST  MULTICAST
  • 5. ROUTING 5  It is a method of finding paths from origin to destination in a network.  It is the process of moving a packet of data from source to destination. Routing is usually performed by a dedicated device called a router.  Routing is a key feature of the Internet because it enables messages to pass from one computer to another and eventually reach the target machine.
  • 6. ROUTING TABLE 6  It is a data table stored in a router or a networked computer that lists the routes to particular network destination.  A routing table uses the same idea that one does when using a map in package delivery. Whenever a node needs to send data to another node on a network, it must first know where to send it. If the node cannot directly connect to the destination node.  A routing table is a data file in RAM that is used to store route information about directly connected and remote networks.
  • 7. ~Mask – subnet mask. ~Network Address – address of the final destination of a packet. ~Next-hop – address of the next router to receive the packet. ~Interface – name of the interface. 7
  • 8. CATEGORIES OF ROUTIG TABLE 8 1) STATIC ROUTING TABLE  It is a form of routing that occurs when a router uses a manually-configured routing entry, rather than information from a dynamic routing traffic.  In many cases, static routes are manually configured by a network administrator by adding in entries into a routing table, though this may not always be the case.  static routes are fixed and do not change if the network is changed or reconfigured. Static routing is often used to help transfer routing information from one routing protocol to another
  • 9. 2) DYNAMIC ROUTING TABLE 9  It is a networking technique that provides optimal data routing. The router delivers and receives the routing messages on the router interfaces.  Whenever a router finds a change in topology, the routing protocol advertises this topology change to other routers.  Dynamic routing is less secure than static routing. It describes the capability of a system, through which routes are characterized by their destination.
  • 10. ROUTING TECHNIQUES 10 A. UNICAST ROUTING  Unicast routing is the process of forwarding unicasted traffic from a source to a destination on an internetwork.  Unicasted traffic is destined for a unique address. The host and the destination addresses in the IP datagram are the unicast address assigned to the host.  A unicast packet starts from the source and passes through routers to reach the destination. Unicast transmission, in which a packet is sent from a single source to a specified destination.
  • 11. 11
  • 12. 12 INTRA AND INTERDOMAIN ROUTING – Intra domain routing is the routing within (inside) a group of networks. While Inter domain routing is the routing outside a group of networks (communication between two or more group of networks). MULTIPLE UNICAST – several packets starts from the source. Many copies will travel between the routers, each with a different destination address and sends them one-by-one.
  • 13. 13 UNICAST ROUTING PROTOCOLS  Distance Vector Routing e.g. RIP  Link State Routing e.g. OSPF  Path Vector Routing e.g. BGP
  • 14. 14 B. MULTICAST ROUTING  Multicast routing is a method of sending Internet Protocol (IP) datagrams to a group of interested receivers in a single transmission.  A multicast datagram is delivered to destination group members with the same “best-effort” reliability as a standard unicast IP datagram.  Multicast routers execute a multicast routing protocol to define delivery paths that enable the forwarding of multicast datagrams across an internetwork.
  • 15. 15
  • 16. 16 APPLICATIONS OF MULTICASTING  Access to Distributed Databases  Distance Learning  Teleconferencing MULTICAST ROUTING PROTOCOLS i. Source-Based Tree  MOSPF  DVMRP  PIM-DM ii. Group-Shared Tree  CBT  PIM-SM
  • 17. 17 CONCLUSION Routing has been discussed with routing table, for easy understanding of how packets are forwarded from a source to a destination. The presentation shows you how routing occurs despite the fact that the protocols have not been discussed but atleast the introductory aspect have been covered. I believed my colleagues will give a detail about the protocols and in that case you will understand in full what happens during routing using the protocols. Lastly, references have been provided for easy search and more understanding were necessary.
  • 18. REFERENCES 18 [1]. Aaron Balchunas. (2007). The Cisco IOS v1.22. [2]. Andrew Tanenbaum, S. (2011). Computer Networks (4th edition), Ph. D from the university of California. [3]. Angelos Stavrou. (2007). Cisco Inter-network Operating System (IOS), a short guide for the Net Admin. [4]. Barry, G. B. (2007). Computer Systems and Networks. [5]. Behrouz, A. (2002). Data communication and Networks [6]. Behrouz A. Forouzan (2012). Data Communication and Networking (5th Edition).
  • 19. [7]. Dana Madison, E., & Aaron Sanders, D. (2001). Data Communications Concepts. [8]. David Wetherall, J. (2014).WA: computer Networks (5th edition). University of Washington Seattle. [9]. Larry L. Peterson & Bruce S. Davie. (2007). Computer Networks, a system approach. [10]. Todd, L. (2007). CCNA Study guide for networking (6th Edition). [11]. Tom, S. (2002). Encyclopedia of Networking and Data Communication. [12]. William, S. (2007). Data and Computer Communications (8th Edition). 19