Solved

About distance table and distance vector routing algorithm

Posted on 2004-10-17
4
549 Views
Last Modified: 2012-05-05
Hi, I'm studying this algorithm
, here is a simple network:
http://www.geocities.com/chikongyuen/DV.jpg

here is my distance table so far, I'm not too sure if it's right...since I can't find any example like that,
here is my  work:
http://www.geocities.com/chikongyuen/DT.txt
can anyone one give me some idea, am I doing right, or missing something or on the wrong track...
thanks in advance
0
Comment
Question by:penny_hardway
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 11

Expert Comment

by:rafael_acc
ID: 12332443
Take a look at the Dijkstra algorithm theory!
0
 

Author Comment

by:penny_hardway
ID: 12332666
I think i'm using the  Bellman-Ford one...is that wrong?
0
 
LVL 11

Accepted Solution

by:
rafael_acc earned 300 total points
ID: 12333517
That's ok. This usualy is used by the RIP routing protocol. I don't know the theory behind Bellman-Ford. You should have a good theory background about the algorithm before trying to apply it.

http://www.brainyencyclopedia.com/encyclopedia/b/be/bellman_ford_algorithm.html

Just insert the algorithm (code lines) and run it! Then you would be able to check either what u r doing is right or wrong.
Cheers.
0
 

Author Comment

by:penny_hardway
ID: 12333597
thanks, i think i got some misunderstand about the algo..anyway.thanks
0

Featured Post

NEW Veeam Agent for Microsoft Windows

Backup and recover physical and cloud-based servers and workstations, as well as endpoint devices that belong to remote users. Avoid downtime and data loss quickly and easily for Windows-based physical or public cloud-based workloads!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
In this article, I am going to show you how to simulate a multi-site Lab environment on a single Hyper-V host. I use this method successfully in my own lab to simulate three fully routed global AD Sites on a Windows 10 Hyper-V host.
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Suggested Courses

696 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question