Advantages of ls over dv algorithm, Computer Networking

Advantages of LS over DV algorithm

There  are a number of advantages to link  state  protocols  especially when  compared to  the distance vector based  routing  protocols. These  advantages include the followings.

a.Smaller  routing  Tables: Because  the router only  maintains a table of link  states rather  than a copy of  every  route on the  network  it is able  to maintain much  smaller routing  tables.

b.Highly Scalable :Link  state  protocols  are not limited  to 15 hops  as distance vector  based protocols  are so  they are able to scale to much larger  networks.

Posted Date: 3/16/2013 3:37:55 AM | Location : United States







Related Discussions:- Advantages of ls over dv algorithm, Assignment Help, Ask Question on Advantages of ls over dv algorithm, Get Answer, Expert's Help, Advantages of ls over dv algorithm Discussions

Write discussion on Advantages of ls over dv algorithm
Your posts are moderated
Related Questions
Fully connected : It is the most powerful interconnection topology.  In this every node is directly associated to all other nodes. The limitation of this network is that it needs t

Token Passing Station is able to send only when it receives a special frame called a token Token circulates around the ring If station wishes to sen

NETWORK OWNERSHIP:   There are two types in this case: 1. Private Network 2. Public Network

Q. Define V - 32 modem? - ITU-T's V.32 standard was issued in 1989 for asynchronous and full-duplex operation at 9600 bps. - Even though designed for asynchronous DTEs two


Q. Describe Differential Manchester? - Inversion at middle of bit interval is utilized for synchronization - Presence or else absence of additional transition at beginning o

What is a pointer and does Java support pointers? Pointer is a reference handle to a memory location. Improper handling of pointers leads to memory leaks and reliability issues

Describe what is meant by Asymmetric Multiprocessing (AMP)? Ans) It imposses hierarchy and a division of labour between processors. Only one designated processor, the master, co

State the example of intranet security Imagine a situation when a company develops a major new product secretly using its Intranet. Hackers break the security and take away all

Random forests : An ensemble of the classification or the regression trees (see the classification and regression tree methods) that have been fitted to the same n observations, bu