Networking/Routing Why Do Hosts Have Term Paper

PAGES
1
WORDS
361
Cite

Networking/Routing

Why do hosts have routing tables even if they only have one interface?

Hosts such as individual servers or PCs use routing table to optimize the way they handle and direct packet data. Without the routing table, a host would not be able to specify the default gateway on a subnet with multiple gateway points. The routing table allows multiple subnets and local nets, alerting hosts about the default gateways and network addresses. Even when using only one interface, the host still needs to specify destination gateways and routing tables. Routing tables also allow for default routing.

How does split horizon work?

Split horizon works with distance vector protocols like routing information protocol (RIP). Using the split horizon command, the network avoids creating packet loops, which can create inefficient data streams. Instead of sending packets back along the same route, the split horizon forces packets through and prevents packets from being sent back along the same interface. Essentially, split horizon works by preventing a router from advertising itself on the same network. Split horizon may also work through "poisoning" the packet to prevent re-transmission.

7.6 Why are "all ones" and "all zeros" subnets not used?

All ones" and "all zeros" subnets are avoided because they can cause confusion on the network. All zeros create confusion between the network address and subnet addresses, whose prefixes are the same. A router would not be able to determine whether a packet was to be directed to the entire subnet or to a specific host on it. Similarly, all ones broadcast addresses can be confused with one another especially in directed and all-subnets directed broadcasting using class-based routing protocols.

7.7 How does direct broadcast work using Figure 7-18 as an example?

The directed broadcast specifies all network hosts, allowing packets to be broadcast from the source to the entire network. When the source computer broadcasts information, it will received by Router B. With direct broadcast enabled, router B. will forward to Router a. A will then forward to 10.2.0.0 and 10.1.0.0 and any other hosts on that network. Without direct broadcast, Router B. would not redirect the packet, or Router a would rest at forwarding it to 10.1.0.0

Cite this Document:

"Networking Routing Why Do Hosts Have" (2007, March 27) Retrieved April 26, 2024, from
https://www.paperdue.com/essay/networking-routing-why-do-hosts-have-39063

"Networking Routing Why Do Hosts Have" 27 March 2007. Web.26 April. 2024. <
https://www.paperdue.com/essay/networking-routing-why-do-hosts-have-39063>

"Networking Routing Why Do Hosts Have", 27 March 2007, Accessed.26 April. 2024,
https://www.paperdue.com/essay/networking-routing-why-do-hosts-have-39063

Related Documents

This process will make it seem as though every PC workstation has its own internet connection similar to a house with a single internet connection and through an antenna provides connections for any PC within range of the signal. Internal communications hardware will consist of CISCO routers in addition to the DELL server technology. Routing to and from these classrooms will require two hubs per class. The reason each class

Arby Fields: Computing, Networking, And Information Technology Hardware and Software Recommendations Fields Comprehensive Youth Services Inc. (FCYS) is a small nonprofit company based in southern California that serves adolescent male who are dependent and delinquent minors. FCYS has thirty employees. This study addresses the computing needs of the organization including hardware and software requirements as well as requirements for information technology security in the organization. The purpose of this study is to

Wireless Networking
PAGES 44 WORDS 12201

Wireless Networking Phenomenon Today's world is faced with a myriad of challenging and complex issues that require advanced technological solutions. As technology becomes increasingly user-friendly and focused on the consumer, it is evident that users have become more dependent on wireless technological devices as mechanisms that promote convenience, survival, and economic prosperity. Devices such as cellular phones, laptop computers, and personal digital assistants have become absolute essential components for many consumers

(Cisco, 2009) It is reported by Nortel that it has been indicated by 86% of service providers that there is a high demand for Ethernet services today. The result is that carriers are seeking to fulfill the demand through "upgrading their metro networks to deliver cost-effective Ethernet-based services to their customers." (2009) MPLS is stated to have been invented for the express purpose of "...of solving the problem of bridging

Transitioning From IPv4 to IPv6 The proposed migration from IPv4 to IPv6 is on in some organizations though some organizations have not put in place measures to ensure the transition. The transition has been initiated since IPv6 offers increased addressing capacity, quality of service provisioning as well as improved routing efficiency. However, shifting from the current platform, IPv4 is not easy given the incompatibility of these two internet protocols. In addition,

conceptualize the networking process is with the open systems interconnection reference model (OSI). The OSI model proposes that networking will occur on seven layers, sometimes referred to as a stack. Those seven layers include the physical layer, the data link layer, the network layer, the transport layer, the session layer, the presentation layer, and finally, the application layer. Systems designers and operators both benefit from conceptualizing networks in this