Comparison of distance-vector and link-state algorithm, Computer Networking

DISTANCE-VECTOR ROUTING:

  • It is easy to implement.
  • Packet switch modifies its own routing table first.
  • It is used in RIP.

LINK-STATE ALGORITHM:

  • It is very complex.
  • Switches operates independent computations.
  • It is used in OSPF.
Posted Date: 7/31/2012 7:10:45 AM | Location : United States







Related Discussions:- Comparison of distance-vector and link-state algorithm, Assignment Help, Ask Question on Comparison of distance-vector and link-state algorithm, Get Answer, Expert's Help, Comparison of distance-vector and link-state algorithm Discussions

Write discussion on Comparison of distance-vector and link-state algorithm
Your posts are moderated
Related Questions
How to protect computer Hardware by threats The first component in the computer system vulnerable to attacks or threats, and most important to be protected, is the hardware.

What do you mean by Beaconing and Auto-Reconfiguration? When a station does not receive a message from its nearest active upstream neighbor, it sends out a warning, otherwise c

Troubleshoot and Correct VTP and Configuration Errors When all errors are corrected, you should be capable to ping PC4 from PC1, PC5 from PC2, and PC6 from PC3. You should also

Discuss about the Hypertext The hypertext allows for the integration of text, graphics, audio and video on a webpate. This can make it very easy to browse and very exciting to

Question: (a) Describe the importance of backups and the use of antivirus software. (b) With the help of an example/ illustration, explain the term encryption and explain

What is the difference between TFTP and FTP application layer protocols? The Trivial File Transfer Protocol (TFTP) allows a local host to obtain files from a remote host but d

Describe about the Server and browser software Most of the server and browser software developed by various vendors carry out encryption using either a 40-bit or a 128-bit sec

Tunnelling To guarantee privacy for the  organization, VPN specifies that each IP datagram destined for private  use of the  organization, must  first be  encrypted and then en

Question : a) Give three examples of vulnerable services which are among the overwhelming majority of successful attacks. b) Name the five outside sources which can be the

Determine the benefits of security on internet or intranet Security has long been seen as a major threatening point in the implementation of the Internet or of Intranet technolog