StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Routing Algorithms - Assignment Example

Cite this document
Summary
Today, OSPF is most widely used while once popular RIP is undergoing extensive development. (Forouzan 2006)
OSPF is a complex…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94% of users find it useful
Routing Algorithms
Read Text Preview

Extract of sample "Routing Algorithms"

Routing Algorithms I.D. of the Routing Algorithms In this paper, some widely used complex routing algorithms are discussed which can be used to manage complicated networks and build routing tables. Today, OSPF is most widely used while once popular RIP is undergoing extensive development. (Forouzan 2006)Open Shortest Path First (OSPF) OSPF is a complex routing algorithm that can analyze the link-state situation of the given network. It can maintain the routes for all possible destinations in a network continuously.

The routing table built by OSPF is based on topology database, and selection of nodes is done along shortest paths. The shortest path has least number of nodes in it. Hence, the technique proactively helps in ascertaining adjacency properties of two or more given nodes. (Perkins and Bhagwat 1994)AdvantagesOSPF can detect which nodes are closestSince OSPF can analyze the changes in link state, it can handle dynamic networks by instantaneously updating the routing tablesIt can be simply applied to networks where both workstations and mobile computers are being usedDisadvantagesGenerates highly complex and bulky trafficUses a number of varieties of data packets, where each variety has its specific functions.

Therefore, the overall working of this algorithm is considerably complicatedTemporally-Ordered Routing Algorithm (TORA) TORA is a combination of both reactive and proactive techniques. It can be implemented across large and distributed networks without the fear of further complications. TORA can also respond to any modifications in the network topology. Thus, TORA is also ideal for handling dynamic networks, where mobile devices or nodes are actively used. However, “since multiple paths are used in TORA, routes may not be the shortest ones always” (Logambal and Chitra 2014).

AdvantagesRapidly identifies and synchronizes available neighboring nodesCan maintain network states and continuously update the routing tableIt is capable of accomplishing both proactive and reactive routing operationsDisadvantagesTORA is not scalableNot widely used, so compatibility issues may ariseProtocols like AODV and DSR often outperform TORA in discharging basic network management functionsRouting Information Protocol (RIP) It is one of the simplest and earliest routing protocols that can be utilized for generating routing tables.

RIP has a primitive design and it may generate very large traffic load in a modern, fully operational computer network. RIP utilizes the User Datagram Protocol or UDP for the purpose of its main transport and communication protocol. (Malkin 2000)AdvantagesVersions of RIP that are readily compatible with the advanced versions of Internet Protocol or IP help in modernizing its implementation fasterAlthough it is non-proprietary, it is well compatible with Cisco routing technologies which are widely used across the worldDisadvantagesToo simple to be used in modern, dynamic networksMay lead to traffic burstPoor scalabilityReferencesForouzan, B.A. (2006).

TCP/IP Protocol Suite. Boston: McGraw HillLogambal, R., & Chitra, K. (2014). A Study on Routing Protocols for Mobile Adhoc Networks. International Journal of Innovative Research in Computer and Communication Engineering, 2, 3259-3264Malkin, G.S. (2000). RIP: An Intra-Domain Routing Protocol. Addison-Wesley LongmanPerkins, C.E. and Bhagwat, P. (1994). Highly Dynamic Destination Sequenced Distance Vector Routing for Mobile Computers, Proc. Of Computer Communication Rev. 1, 234-244.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Routing Algorithms Assignment Example | Topics and Well Written Essays - 500 words”, n.d.)
Routing Algorithms Assignment Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1652331-routing-algorithms
(Routing Algorithms Assignment Example | Topics and Well Written Essays - 500 Words)
Routing Algorithms Assignment Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1652331-routing-algorithms.
“Routing Algorithms Assignment Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1652331-routing-algorithms.
  • Cited: 0 times

CHECK THESE SAMPLES OF Routing Algorithms

Temporally-Ordered Routing Algorithm

) name the TORA protocol as one of a family of protocols which they term "link reversal" algorithms.... The basic, underlying algorithm is neither distance-vector nor link-state; it is a member of a class referred to as link-reversal algorithms.... The paper "Temporally-Ordered routing Algorithm" tells us about the algorithm for routing data across Wireless Mesh Networks.... The protocol builds a loop-free, multipath routing structure that is used as the basis for forwarding traffic to a given destination....
10 Pages (2500 words) Essay

TCP Has Got Widespread Usage in Computer Networking

The lack of dynamicity in the behavior of the protocol may cause unnecessary retransmission and rate reduction as well further improvement in the technology involving Routing Algorithms, network components and link-layer retransmission mechanisms.... TCP has got widespread usage in computer networking because of its ability to perceive any congestion in the applied network....
2 Pages (500 words) Essay

Computer Peripheral Architecture

This paper ''Computer Peripheral Architecture'' will discuss the various peripherals being used in virtual environments.... There are three main areas are to be researched into, which are Data storage and representation, Environment manipulation, and Communication.... A lot of new peripherals are being introduced....
7 Pages (1750 words) Essay

Mobile Computing and Inter-Vehicle Communication

(Chen 2001) Traditional routing protocols used on the mobile ad-hoc networks (MANET) can be divided into two major categories: the single path and the multipath routing.... This information helps each node to update the routing tables being maintained at each node....
10 Pages (2500 words) Essay

Computer and Network Hardware

Network routing: algorithms, protocols, and architectures.... It comprises of a multiport that can hold a number of networks (Lewis, 2008).... The use of switches in a network is necessary for effective control of the network.... It is through the network switch that… The switch also allows reception of telecommunication message and transmission of the message to the required device (Lewis, 2008). A router is a physical device joining a number of networks both wired and Computer and Network Hardware Use of switches in a network A network switch refers to a networking device usedto link network devices....
1 Pages (250 words) Assignment

Advanced Networks

The author of the paper describes the reasons for the inexhaustive availability of IP addresses, the encoding scheme with Cat 5, 100 Base-TX, time-space diagram, Distance vector Routing Algorithms, and Piconet and Scatternet in the context of Bluetooth networking … To deal with this problem, we have two modes of operation: DCF (Distributed Coordination Function) and PCF (Point Coordination Function)....
12 Pages (3000 words) Assignment

Networking Technologies, Applications and Issues

This essay "Networking Technologies, Applications and Issues" discusses the Advanced Research Projects Agency Network that was designed to form a network that would help communication between devices.... It also discusses why and how ARPANET changed into the Internet.... nbsp;… The growing demand for a network that could synchronize different smaller networks to facilitate data communication worldwide led to the invention of the internet....
6 Pages (1500 words) Essay

Mobile Communication

The foreign agent opens the datagram which delivers the packet using conventional IP routing.... d) Triangle routing refers to a situation in which the mobile node can directly send packets to any correspondent node but that node or any other internet node is unable to communicate directly with the mobile node....
9 Pages (2250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us