Best State of Art IT Security Solutions
The best Innovative and powerful IT Security products

Encyclopedia / Encyclopedia Part 3 /

What is a Routing Table?

A network routing table can be categorized as an electronic document that stores the routes to the various nodes in a computer network. The nodes may be any kind of electronic device connected to the network.


The routing table is usually stored in a router

Or other networked computer in the form of a database file. When data needs to be sent from one node to another on the network, the routing table is referred to in order to find the best possible route for the transfer of information.

Hop-by-hop routing is a common routing method used in networks wherein for each node in the network, the address of the next node leading to the destination is listed. So when a data packet arrives at a particular node, it then refers to the routing table to find the address of the next hop destination. Once it reaches that node, it again refers to the routing table for the address of the next hop and so on, until it reaches the final destination.

For a large network consisting of a number of nodes and routers, the routing tables in all the routers need to be consistent, failing which, routing loops can often develop. This can create problems, especially in networks that use the hop by hop network routing model in which the data packets can end up being sent in an endless routing loop. Routing loops have always been a recurring problem in networks and one of the major goals of designing routing protocols is the careful avoidance of these loops.

Routing tables can generally be maintained manually when the network is small and static. The routing tables for all static network devices never change unless and until the administrator of the network changes them manually.

 

In dynamic routing, the devices themselves automatically build and maintain their own routing tables. They do this by exchanging information regarding the network topology using routing protocols. This enables the devices in the network to automatically adapt to the changes in the network like device failures and network congestion as and when they occur.

The SecPoint® Protector (https://www.secpoint.com/secpoint-protector.html) comes fully loaded with the routing table feature so that the customer can route all the networks through the Protector as needed.
Vulnerability Scanner - Vulnerability Management 

 

➤ Related pages
Anti-Spam Firewall
Appliance VS Software
Cloud Security
WEP Key
What is a Man in the Middle Attack?
What is a Routing Table?
What is CISSP?
What is Data Leak Prevention?
What is Dumpster Diving?
What is Grey Listing?
What is GSM Encryption?
What is Instant Messaging?
What is Port Knocking?
What is search engine hacking?
What is Spyware?
What is TCP?
What is UDP?
What is UTM?
What is Virus?
What is VoIP?
What is Whitelisting?
WiFi Pen Test
WPA Key

Powerful UTM Firewall, Vulnerability Scanner, WiFi Penetration Testing software

SecPoint is specialized to deliver the best IT security solutions and products.

Compatible with Product
Securely protected by SecPoint
Customer reference King Customer reference New York Customer reference ROC Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef Customer reference King Customer reference New York Customer reference Roc Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef