Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

About distance table and distance vector routing algorithm

Posted on 2004-10-17
4
Medium Priority
?
553 Views
Last Modified: 2012-05-05
Hi, I'm studying this algorithm
, here is a simple network:
http://www.geocities.com/chikongyuen/DV.jpg

here is my distance table so far, I'm not too sure if it's right...since I can't find any example like that,
here is my  work:
http://www.geocities.com/chikongyuen/DT.txt
can anyone one give me some idea, am I doing right, or missing something or on the wrong track...
thanks in advance
0
Comment
Question by:penny_hardway
  • 2
  • 2
4 Comments
 
LVL 11

Expert Comment

by:rafael_acc
ID: 12332443
Take a look at the Dijkstra algorithm theory!
0
 

Author Comment

by:penny_hardway
ID: 12332666
I think i'm using the  Bellman-Ford one...is that wrong?
0
 
LVL 11

Accepted Solution

by:
rafael_acc earned 900 total points
ID: 12333517
That's ok. This usualy is used by the RIP routing protocol. I don't know the theory behind Bellman-Ford. You should have a good theory background about the algorithm before trying to apply it.

http://www.brainyencyclopedia.com/encyclopedia/b/be/bellman_ford_algorithm.html

Just insert the algorithm (code lines) and run it! Then you would be able to check either what u r doing is right or wrong.
Cheers.
0
 

Author Comment

by:penny_hardway
ID: 12333597
thanks, i think i got some misunderstand about the algo..anyway.thanks
0

Featured Post

Get your problem seen by more experts

Be seen. Boost your question’s priority for more expert views and faster solutions

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article is a collection of issues that people face from time to time and possible solutions to those issues. I hope you enjoy reading it.
In this article I will be showing you how to subnet the easiest way possible for IPv4 (Internet Protocol version 4). This article does not cover IPv6. Keep in mind that subnetting requires lots of practice and time.
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

577 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question