Advantages of ls over dv algorithm, Computer Networking

Assignment Help:

Advantages of LS over DV algorithm

There  are a number of advantages to link  state  protocols  especially when  compared to  the distance vector based  routing  protocols. These  advantages include the followings.

a.Smaller  routing  Tables: Because  the router only  maintains a table of link  states rather  than a copy of  every  route on the  network  it is able  to maintain much  smaller routing  tables.

b.Highly Scalable :Link  state  protocols  are not limited  to 15 hops  as distance vector  based protocols  are so  they are able to scale to much larger  networks.


Related Discussions:- Advantages of ls over dv algorithm

Tcp-ip and osi differences, Q. TCP-IP and OSI Differences - TCP/IP com...

Q. TCP-IP and OSI Differences - TCP/IP combines the Presentation and Application Layers - TCP/IP combines the OSI Data Link and Physical Layers into 1 Layer - TCP/IP app

What are the value added services, What are the value added services Ma...

What are the value added services Many organisations are demanding higher services (also called value added services) such as faxing, minimal cost call routing, connectivity to

What is virtual lans, Q. What is Virtual LANs? Virtual LANs - LAN...

Q. What is Virtual LANs? Virtual LANs - LAN (Local area network) configured by software not by physical wiring Virtual LANs - Divides a LAN into logical, in

Write down short note on frame-relay dlci, DLCI- Data Link Connection Iden...

DLCI- Data Link Connection Identifier. A frame-relay service provider usually assigns DLCI values that are used by frame-relay to distinguish among different virtual circuits on th

Shared variable programme structures, Shared variable programme structures ...

Shared variable programme structures  In this section, we talk about some more concepts related to the shared programme. Concept of Lock Locks are used for protected a

Networking, What is the implication of increasing and decreasing subnet Bit...

What is the implication of increasing and decreasing subnet Bits?

Find the main problems with access points in a wireless lan, Question: ...

Question: Wireless Access points have been known to have various security vulnerabilities that can lead to breach of Secured wired networks. IEEE 802.11 standards have identifi

netware protocol works on layer 3, Which NetWare protocol works on layer 3...

Which NetWare protocol works on layer 3--network layer-of the OSI model? Ans)IPX

Configure the management interface- spanning tree protocol, Configure the m...

Configure the management interface address on all three switches.  S1(config)#interface vlan1 S1(config-if)#ip address 172.17.10.1 255.255.255.0 S1(config-if)#no shutdown

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd