Forwarding table
However much we try to keep a routing table and a forwarding table in the same structure, there are several reasons to separate them. When forwarding a packet, a forwarding table is supposed to be structured to optimize the process of looking up an IP address while a routing table mostly focuses on calculating changes in topologies and including the IP address and the next hop device
Answer:
The ideal cryptographic hash function has four properties: it is quick to compute the hash value for any given message. it is infeasible to generate a message from its hash value. it is infeasible to modify a message without changing the hash value.
Answer:#include<stdio.h>
int main(){
int i=1;
while(i<=10){
printf("%d \n",i);
i++;
}
return 0;
}
Explanation:
This is the program I coded on the while loop.