Advantages of ls over dv algorithm, Computer Networking

Assignment Help:

Advantages of LS over DV algorithm

There  are a number of advantages to link  state  protocols  especially when  compared to  the distance vector based  routing  protocols. These  advantages include the followings.

a.Smaller  routing  Tables: Because  the router only  maintains a table of link  states rather  than a copy of  every  route on the  network  it is able  to maintain much  smaller routing  tables.

b.Highly Scalable :Link  state  protocols  are not limited  to 15 hops  as distance vector  based protocols  are so  they are able to scale to much larger  networks.


Related Discussions:- Advantages of ls over dv algorithm

Difference between latches and flip flops, What is the basic difference bet...

What is the basic difference between latches and flip flops? Ans) flip flops have clock signal whereas latches dont require anyclock pulse..

Difference between unicast and anycast, Difference between Unicast and Anyc...

Difference between Unicast and Anycast Unicast: An identifier for a single interface. A packet sent to a unicast address is delivered to the interface identified by that addres

Define the concept of repeaters, Can you define the concept of Repeaters, H...

Can you define the concept of Repeaters, Hubs, Bridges, Switches and Routers?

What is usage of sequence number in reliable transmission, What is usage of...

What is usage of Sequence Number in Reliable Transmission? The protocol specifies that frames need to be numbered. This is done by using sequence numbers. A field is added to t

Explain network services, Explain Network Services Network services are...

Explain Network Services Network services are the thing that a network can do. The main networking services are File Services: This contains file transfer, storage, data m

Explain the term - global corporate-wide network, Explain the term - global...

Explain the term - global corporate-wide network It would be highly interesting to note that more than 70 per cent of all security related problems start from within the organi

Layers, what are the layers covered under end to end later connectivity?

what are the layers covered under end to end later connectivity?

Analyze snort or pcap data from a public wifi hotspot, The project idea is ...

The project idea is : Analyze Snort or PCAP data from a public WIFI hotspot (describe traffice seen and what it is, protocols, ports, etc). This is what is expected. Initially r

Public key cryptography and private key cryptography, Question: a) Di...

Question: a) Differentiate between the following key terms used in any e-banking security system: (i) Authorisation v/s Authentication. (ii) Data Integrity v/s Data Conf

What is microwave, What is Microwave? Microwaves have been used in data...

What is Microwave? Microwaves have been used in data communications. Microwave has a higher frequency than radio waves and thus can handle larger amounts of data.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd