Advantages of ls over dv algorithm, Computer Networking

Advantages of LS over DV algorithm

There  are a number of advantages to link  state  protocols  especially when  compared to  the distance vector based  routing  protocols. These  advantages include the followings.

a.Smaller  routing  Tables: Because  the router only  maintains a table of link  states rather  than a copy of  every  route on the  network  it is able  to maintain much  smaller routing  tables.

b.Highly Scalable :Link  state  protocols  are not limited  to 15 hops  as distance vector  based protocols  are so  they are able to scale to much larger  networks.

Posted Date: 3/16/2013 3:37:55 AM | Location : United States







Related Discussions:- Advantages of ls over dv algorithm, Assignment Help, Ask Question on Advantages of ls over dv algorithm, Get Answer, Expert's Help, Advantages of ls over dv algorithm Discussions

Write discussion on Advantages of ls over dv algorithm
Your posts are moderated
Related Questions
how to remove runtime error..

What is a Management Information Base (MIB)? A Management Information Base is part of each SNMP-managed device. Every SNMP agent has the MIB database that having information ab

Set Cookies 1178345 When  Hussan  browser receives  the HTTP response  message it sees the set cookies header. The  browser then appends  a line to the special cookie file  th

What are Triggers and Rules? Triggers are special user defined actions generally in the form of stored processes that are automatically invoked by the server based on data rel

Can I get help for traffic congestion anlysis using GIS

QUESTION 1 (a) Draw a use-case model for the above system. You must identify all possible actors and use-cases. (b) Assume you are using the Rational Unified Process a


Q. Show the steps used at sender end by check sum? The sender follows these steps: The data unit is divided into "k" sections, each off "n" bits All sections ar

Originally Linux/UNIX systems had one all-powerful user called root that managed systems. Discuss the risks of having a single root user and how more limited management abilities c

Recalling two FEC schemes for internet phone described. Suppose the first scheme generates a redundant chunk for every four original chunks. Suppose the second scheme uses a low-ra