SlideShare a Scribd company logo
3
Most read
5
Most read
6
Most read
By
K.Sivapriya
Msc(IT)
Nadar Saraswathi College Of Arts & Science
Theni
Routing algorithm
 In order to transfer the packets from source to
the destination, the network layer must
determine the best route through which packets
can be transmitted.
 Whether the network layer provides datagram
service or virtual circuit service, the main job
of the network layer is to provide the best
route. The routing protocol provides this job.
Cont…
 The routing protocol is a routing algorithm that
provides the best path from the source to the
destination. The best path is the path that has
the "least-cost path" from source to the
destination.
 Routing is the process of forwarding the
packets from source to the destination but the
best route to send the packets is determined by
the routing algorithm.
Classification of a Routing
algorithm
 The Routing algorithm is divided into two
categories:
 Adaptive Routing algorithm
 Non-adaptive Routing algorithm
Adaptive Routing algorithm
 An adaptive routing algorithm is also known as
dynamic routing algorithm.
 This algorithm makes the routing decisions
based on the topology and network traffic.
 The main parameters related to this algorithm
are hop count, distance and estimated transit
time.
Non-Adaptive Routing algorithm
 Non Adaptive routing algorithm is also known
as a static routing algorithm.
 When booting up the network, the routing
information stores to the routers.
 Non Adaptive routing algorithms do not take
the routing decision based on the network
topology or network traffic.
Distance Vector Routing Algorithm
 A distance-vector routing (DVR) protocol
requires that a router inform its neighbors of
topology changes periodically. Historically
known as the old ARPANET routing algorithm
(or known as Bellman-Ford algorithm). ...
Distances,based on a chosen metric, are
computed using information from the
neighbors' distance vectors.
Cont…
 Distributed: It is distributed in that each node
receives information from one or more of its
directly attached neighbors, performs calculation
and then distributes the result back to its neighbors.
 Iterative: It is iterative in that its process continues
until no more information is available to be
exchanged between neighbors.
 Asynchronous: It does not require that all of its
nodes operate in the lock step with each other.
working of Distance Vector
Routing Algorithm
 Knowledge about the whole network: Each
router shares its knowledge through the entire
network. The Router sends its collected
knowledge about the network to its neighbors.
 Routing only to neighbors: The router sends
its knowledge about the network to only those
routers which have direct links. The router
sends whatever it has about the network
through the ports.
Cont…
The information is received by the router and
uses the information to update its own routing
table.
 Information sharing at regular
intervals: Within 30 seconds, the router sends
the information to the neighboring routers.
Link State Routing
 In link-state routing, each router shares its
knowledge of its neighbourhood with all
routers in the network. Link-state protocols
implement an algorithm called the shortest path
first (SPF, also known as Dijkstra's Algorithm)
to determine the path to a remote destination
Link State Routing algorithm
 Knowledge about the neighborhood: Instead
of sending its routing table, a router sends the
information about its neighborhood only. A
router broadcast its identities and cost of the
directly attached links to other routers.
 Flooding: Each router sends the information to
every other router on the internetwork except
its neighbors. This process is known as
Flooding.
Cont…
Every router that receives the packet sends the
copies to all its neighbors. Finally, each and
every router receives a copy of the same
information.
 Information sharing: A router sends the
information to every other router only when the
change occurs in the information.
Link State Routing has two phases
 Reliable Flooding
 Initial state: Each node knows the cost of its
neighbors.
 Final state: Each node knows the entire graph.
 Route Calculation
 Each node uses Dijkstra's algorithm on the
graph to calculate the optimal routes to all
nodes.
Cont…
 The Link state routing algorithm is also known
as Dijkstra's algorithm which is used to find the
shortest path from one node to every other
node in the network.
 The Dijkstra's algorithm is an iterative, and it
has the property that after kth iteration of the
algorithm, the least cost paths are well known
for k destination nodes.
Ad

Recommended

Presentation Routing algorithm
Presentation Routing algorithm
Basit Hussain
 
Multiple access protocol
Multiple access protocol
Merlin Florrence
 
Computer network switching
Computer network switching
Shivani Godha
 
Routing algorithm network layer
Routing algorithm network layer
sambhenilesh
 
ALOHA Protocol (in detail)
ALOHA Protocol (in detail)
Hinal Lunagariya
 
Media Access Control
Media Access Control
VijayaLakshmi514
 
Unit 2 data link control
Unit 2 data link control
Vishal kakade
 
Routing algorithms
Routing algorithms
Parameswaran Selvakumar
 
Issues in Data Link Layer
Issues in Data Link Layer
selvakumar_b1985
 
Ipv4 presentation
Ipv4 presentation
shakeel khan
 
Routing algorithm
Routing algorithm
Bushra M
 
Multiple Access in Computer Network
Multiple Access in Computer Network
Hitesh Mohapatra
 
Distance vector routing
Distance vector routing
Siddique Ibrahim
 
CSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARE
Khushboo Pal
 
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)
Meenakshi Paul
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
Shubham Khedekar
 
ENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELING
Mohammad Adil
 
Transmission impairments(presentation)
Transmission impairments(presentation)
Vivek Kumar
 
Link state routing protocol
Link state routing protocol
Aung Thu Rha Hein
 
The medium access sublayer
The medium access sublayer
Lal Bahadur Gehlot
 
Flow Control
Flow Control
selvakumar_b1985
 
Unit 3 Network Layer PPT
Unit 3 Network Layer PPT
KalpanaC14
 
Computer networks - Channelization
Computer networks - Channelization
Elambaruthi Elambaruthi
 
Data link layer
Data link layer
Mukesh Chinta
 
priority interrupt computer organization
priority interrupt computer organization
chnrketan
 
RANDOM ACCESS PROTOCOL IN COMMUNICATION
RANDOM ACCESS PROTOCOL IN COMMUNICATION
AMOGHA A K
 
Flow Control.pptx
Flow Control.pptx
AshokRachapalli1
 
Multiple Access Protocal
Multiple Access Protocal
tes31
 
Routing Protocols notes document .pptx.pdf
Routing Protocols notes document .pptx.pdf
stefanrowlings
 
Module 3- transport_layer .pptx
Module 3- transport_layer .pptx
hariprasad279825
 

More Related Content

What's hot (20)

Issues in Data Link Layer
Issues in Data Link Layer
selvakumar_b1985
 
Ipv4 presentation
Ipv4 presentation
shakeel khan
 
Routing algorithm
Routing algorithm
Bushra M
 
Multiple Access in Computer Network
Multiple Access in Computer Network
Hitesh Mohapatra
 
Distance vector routing
Distance vector routing
Siddique Ibrahim
 
CSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARE
Khushboo Pal
 
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)
Meenakshi Paul
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
Shubham Khedekar
 
ENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELING
Mohammad Adil
 
Transmission impairments(presentation)
Transmission impairments(presentation)
Vivek Kumar
 
Link state routing protocol
Link state routing protocol
Aung Thu Rha Hein
 
The medium access sublayer
The medium access sublayer
Lal Bahadur Gehlot
 
Flow Control
Flow Control
selvakumar_b1985
 
Unit 3 Network Layer PPT
Unit 3 Network Layer PPT
KalpanaC14
 
Computer networks - Channelization
Computer networks - Channelization
Elambaruthi Elambaruthi
 
Data link layer
Data link layer
Mukesh Chinta
 
priority interrupt computer organization
priority interrupt computer organization
chnrketan
 
RANDOM ACCESS PROTOCOL IN COMMUNICATION
RANDOM ACCESS PROTOCOL IN COMMUNICATION
AMOGHA A K
 
Flow Control.pptx
Flow Control.pptx
AshokRachapalli1
 
Multiple Access Protocal
Multiple Access Protocal
tes31
 
Routing algorithm
Routing algorithm
Bushra M
 
Multiple Access in Computer Network
Multiple Access in Computer Network
Hitesh Mohapatra
 
CSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARE
Khushboo Pal
 
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)
Meenakshi Paul
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
Shubham Khedekar
 
ENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELING
Mohammad Adil
 
Transmission impairments(presentation)
Transmission impairments(presentation)
Vivek Kumar
 
Unit 3 Network Layer PPT
Unit 3 Network Layer PPT
KalpanaC14
 
priority interrupt computer organization
priority interrupt computer organization
chnrketan
 
RANDOM ACCESS PROTOCOL IN COMMUNICATION
RANDOM ACCESS PROTOCOL IN COMMUNICATION
AMOGHA A K
 
Multiple Access Protocal
Multiple Access Protocal
tes31
 

Similar to Routing algorithm (20)

Routing Protocols notes document .pptx.pdf
Routing Protocols notes document .pptx.pdf
stefanrowlings
 
Module 3- transport_layer .pptx
Module 3- transport_layer .pptx
hariprasad279825
 
Network Layer
Network Layer
reshmadayma
 
11-RoutingThe development of wireless systems traces its roots .ppt
11-RoutingThe development of wireless systems traces its roots .ppt
vimalgaur7
 
Data Communications and Networks Network Layer
Data Communications and Networks Network Layer
SunilKumar481222
 
Routing algorithm
Routing algorithm
TechStudent1
 
COMPUTER NETWORKS CHAPTER 3 NETWORK LAYER NOTES CSE 3RD year sem 1
COMPUTER NETWORKS CHAPTER 3 NETWORK LAYER NOTES CSE 3RD year sem 1
aishwaryaarrao3
 
Comparative Analysis of Distance Vector Routing & Link State Protocols
Comparative Analysis of Distance Vector Routing & Link State Protocols
East West University
 
CN WEEK 11.pdf
CN WEEK 11.pdf
ssuser06fbd31
 
Routing and IP in Advance Computer Network,Vikram Snehi
Routing and IP in Advance Computer Network,Vikram Snehi
MR. VIKRAM SNEHI
 
11 routing
11 routing
shefali84
 
Computer networks for cse Unit-3 (1).pptx
Computer networks for cse Unit-3 (1).pptx
pkumarnptl
 
module10-rip (1).ppt
module10-rip (1).ppt
Rakesh Dhiman
 
Distance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing Algorithm
MOHIT AGARWAL
 
Routing.pptbbbbbbbbbbbbbbbbbbbbbnbbnbbbbnbb
Routing.pptbbbbbbbbbbbbbbbbbbbbbnbbnbbbbnbb
nijjilnarula1
 
Computer Network - Unicast Routing Distance vector Link state vector
Computer Network - Unicast Routing Distance vector Link state vector
Kongu Engineering College, Perundurai, Erode
 
routing algorithm
routing algorithm
AnusuaBasu
 
UNIT2-nw layer autonomy.pptx
UNIT2-nw layer autonomy.pptx
satvikpatil5
 
Routing
Routing
Amit Pandey
 
Overview of Routing Techniques
Overview of Routing Techniques
SigSegVSquad
 
Routing Protocols notes document .pptx.pdf
Routing Protocols notes document .pptx.pdf
stefanrowlings
 
Module 3- transport_layer .pptx
Module 3- transport_layer .pptx
hariprasad279825
 
11-RoutingThe development of wireless systems traces its roots .ppt
11-RoutingThe development of wireless systems traces its roots .ppt
vimalgaur7
 
Data Communications and Networks Network Layer
Data Communications and Networks Network Layer
SunilKumar481222
 
COMPUTER NETWORKS CHAPTER 3 NETWORK LAYER NOTES CSE 3RD year sem 1
COMPUTER NETWORKS CHAPTER 3 NETWORK LAYER NOTES CSE 3RD year sem 1
aishwaryaarrao3
 
Comparative Analysis of Distance Vector Routing & Link State Protocols
Comparative Analysis of Distance Vector Routing & Link State Protocols
East West University
 
Routing and IP in Advance Computer Network,Vikram Snehi
Routing and IP in Advance Computer Network,Vikram Snehi
MR. VIKRAM SNEHI
 
Computer networks for cse Unit-3 (1).pptx
Computer networks for cse Unit-3 (1).pptx
pkumarnptl
 
module10-rip (1).ppt
module10-rip (1).ppt
Rakesh Dhiman
 
Distance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing Algorithm
MOHIT AGARWAL
 
Routing.pptbbbbbbbbbbbbbbbbbbbbbnbbnbbbbnbb
Routing.pptbbbbbbbbbbbbbbbbbbbbbnbbnbbbbnbb
nijjilnarula1
 
routing algorithm
routing algorithm
AnusuaBasu
 
UNIT2-nw layer autonomy.pptx
UNIT2-nw layer autonomy.pptx
satvikpatil5
 
Overview of Routing Techniques
Overview of Routing Techniques
SigSegVSquad
 
Ad

More from Siva Priya (12)

source code metrics and other maintenance tools and techniques
source code metrics and other maintenance tools and techniques
Siva Priya
 
Class properties
Class properties
Siva Priya
 
Planning the development process
Planning the development process
Siva Priya
 
recovery management with concurrent controls
recovery management with concurrent controls
Siva Priya
 
Web technology
Web technology
Siva Priya
 
Retail of big data analytics
Retail of big data analytics
Siva Priya
 
Deadlock and shadow paging
Deadlock and shadow paging
Siva Priya
 
Mobile IP
Mobile IP
Siva Priya
 
density based method and expectation maximization
density based method and expectation maximization
Siva Priya
 
Classification by backpropacation
Classification by backpropacation
Siva Priya
 
Disk scheduling & Disk management
Disk scheduling & Disk management
Siva Priya
 
Servlets & jdbc
Servlets & jdbc
Siva Priya
 
source code metrics and other maintenance tools and techniques
source code metrics and other maintenance tools and techniques
Siva Priya
 
Class properties
Class properties
Siva Priya
 
Planning the development process
Planning the development process
Siva Priya
 
recovery management with concurrent controls
recovery management with concurrent controls
Siva Priya
 
Web technology
Web technology
Siva Priya
 
Retail of big data analytics
Retail of big data analytics
Siva Priya
 
Deadlock and shadow paging
Deadlock and shadow paging
Siva Priya
 
density based method and expectation maximization
density based method and expectation maximization
Siva Priya
 
Classification by backpropacation
Classification by backpropacation
Siva Priya
 
Disk scheduling & Disk management
Disk scheduling & Disk management
Siva Priya
 
Servlets & jdbc
Servlets & jdbc
Siva Priya
 
Ad

Recently uploaded (20)

“MPU+: A Transformative Solution for Next-Gen AI at the Edge,” a Presentation...
“MPU+: A Transformative Solution for Next-Gen AI at the Edge,” a Presentation...
Edge AI and Vision Alliance
 
Daily Lesson Log MATATAG ICT TEchnology 8
Daily Lesson Log MATATAG ICT TEchnology 8
LOIDAALMAZAN3
 
Lessons Learned from Developing Secure AI Workflows.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Priyanka Aash
 
2025_06_18 - OpenMetadata Community Meeting.pdf
2025_06_18 - OpenMetadata Community Meeting.pdf
OpenMetadata
 
10 Key Challenges for AI within the EU Data Protection Framework.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Priyanka Aash
 
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
revolcs10
 
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Safe Software
 
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Priyanka Aash
 
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Priyanka Aash
 
Cyber Defense Matrix Workshop - RSA Conference
Cyber Defense Matrix Workshop - RSA Conference
Priyanka Aash
 
"Scaling in space and time with Temporal", Andriy Lupa.pdf
"Scaling in space and time with Temporal", Andriy Lupa.pdf
Fwdays
 
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
caoyixuan2019
 
Curietech AI in action - Accelerate MuleSoft development
Curietech AI in action - Accelerate MuleSoft development
shyamraj55
 
9-1-1 Addressing: End-to-End Automation Using FME
9-1-1 Addressing: End-to-End Automation Using FME
Safe Software
 
You are not excused! How to avoid security blind spots on the way to production
You are not excused! How to avoid security blind spots on the way to production
Michele Leroux Bustamante
 
cnc-processing-centers-centateq-p-110-en.pdf
cnc-processing-centers-centateq-p-110-en.pdf
AmirStern2
 
From Manual to Auto Searching- FME in the Driver's Seat
From Manual to Auto Searching- FME in the Driver's Seat
Safe Software
 
"Database isolation: how we deal with hundreds of direct connections to the d...
"Database isolation: how we deal with hundreds of direct connections to the d...
Fwdays
 
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) Slides
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) Slides
Ravi Tamada
 
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Nilesh Gule
 
“MPU+: A Transformative Solution for Next-Gen AI at the Edge,” a Presentation...
“MPU+: A Transformative Solution for Next-Gen AI at the Edge,” a Presentation...
Edge AI and Vision Alliance
 
Daily Lesson Log MATATAG ICT TEchnology 8
Daily Lesson Log MATATAG ICT TEchnology 8
LOIDAALMAZAN3
 
Lessons Learned from Developing Secure AI Workflows.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Priyanka Aash
 
2025_06_18 - OpenMetadata Community Meeting.pdf
2025_06_18 - OpenMetadata Community Meeting.pdf
OpenMetadata
 
10 Key Challenges for AI within the EU Data Protection Framework.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Priyanka Aash
 
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
revolcs10
 
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Safe Software
 
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Priyanka Aash
 
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Priyanka Aash
 
Cyber Defense Matrix Workshop - RSA Conference
Cyber Defense Matrix Workshop - RSA Conference
Priyanka Aash
 
"Scaling in space and time with Temporal", Andriy Lupa.pdf
"Scaling in space and time with Temporal", Andriy Lupa.pdf
Fwdays
 
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
caoyixuan2019
 
Curietech AI in action - Accelerate MuleSoft development
Curietech AI in action - Accelerate MuleSoft development
shyamraj55
 
9-1-1 Addressing: End-to-End Automation Using FME
9-1-1 Addressing: End-to-End Automation Using FME
Safe Software
 
You are not excused! How to avoid security blind spots on the way to production
You are not excused! How to avoid security blind spots on the way to production
Michele Leroux Bustamante
 
cnc-processing-centers-centateq-p-110-en.pdf
cnc-processing-centers-centateq-p-110-en.pdf
AmirStern2
 
From Manual to Auto Searching- FME in the Driver's Seat
From Manual to Auto Searching- FME in the Driver's Seat
Safe Software
 
"Database isolation: how we deal with hundreds of direct connections to the d...
"Database isolation: how we deal with hundreds of direct connections to the d...
Fwdays
 
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) Slides
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) Slides
Ravi Tamada
 
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Nilesh Gule
 

Routing algorithm

  • 2. Routing algorithm  In order to transfer the packets from source to the destination, the network layer must determine the best route through which packets can be transmitted.  Whether the network layer provides datagram service or virtual circuit service, the main job of the network layer is to provide the best route. The routing protocol provides this job.
  • 3. Cont…  The routing protocol is a routing algorithm that provides the best path from the source to the destination. The best path is the path that has the "least-cost path" from source to the destination.  Routing is the process of forwarding the packets from source to the destination but the best route to send the packets is determined by the routing algorithm.
  • 4. Classification of a Routing algorithm  The Routing algorithm is divided into two categories:  Adaptive Routing algorithm  Non-adaptive Routing algorithm
  • 5. Adaptive Routing algorithm  An adaptive routing algorithm is also known as dynamic routing algorithm.  This algorithm makes the routing decisions based on the topology and network traffic.  The main parameters related to this algorithm are hop count, distance and estimated transit time.
  • 6. Non-Adaptive Routing algorithm  Non Adaptive routing algorithm is also known as a static routing algorithm.  When booting up the network, the routing information stores to the routers.  Non Adaptive routing algorithms do not take the routing decision based on the network topology or network traffic.
  • 7. Distance Vector Routing Algorithm  A distance-vector routing (DVR) protocol requires that a router inform its neighbors of topology changes periodically. Historically known as the old ARPANET routing algorithm (or known as Bellman-Ford algorithm). ... Distances,based on a chosen metric, are computed using information from the neighbors' distance vectors.
  • 8. Cont…  Distributed: It is distributed in that each node receives information from one or more of its directly attached neighbors, performs calculation and then distributes the result back to its neighbors.  Iterative: It is iterative in that its process continues until no more information is available to be exchanged between neighbors.  Asynchronous: It does not require that all of its nodes operate in the lock step with each other.
  • 9. working of Distance Vector Routing Algorithm  Knowledge about the whole network: Each router shares its knowledge through the entire network. The Router sends its collected knowledge about the network to its neighbors.  Routing only to neighbors: The router sends its knowledge about the network to only those routers which have direct links. The router sends whatever it has about the network through the ports.
  • 10. Cont… The information is received by the router and uses the information to update its own routing table.  Information sharing at regular intervals: Within 30 seconds, the router sends the information to the neighboring routers.
  • 11. Link State Routing  In link-state routing, each router shares its knowledge of its neighbourhood with all routers in the network. Link-state protocols implement an algorithm called the shortest path first (SPF, also known as Dijkstra's Algorithm) to determine the path to a remote destination
  • 12. Link State Routing algorithm  Knowledge about the neighborhood: Instead of sending its routing table, a router sends the information about its neighborhood only. A router broadcast its identities and cost of the directly attached links to other routers.  Flooding: Each router sends the information to every other router on the internetwork except its neighbors. This process is known as Flooding.
  • 13. Cont… Every router that receives the packet sends the copies to all its neighbors. Finally, each and every router receives a copy of the same information.  Information sharing: A router sends the information to every other router only when the change occurs in the information.
  • 14. Link State Routing has two phases  Reliable Flooding  Initial state: Each node knows the cost of its neighbors.  Final state: Each node knows the entire graph.  Route Calculation  Each node uses Dijkstra's algorithm on the graph to calculate the optimal routes to all nodes.
  • 15. Cont…  The Link state routing algorithm is also known as Dijkstra's algorithm which is used to find the shortest path from one node to every other node in the network.  The Dijkstra's algorithm is an iterative, and it has the property that after kth iteration of the algorithm, the least cost paths are well known for k destination nodes.