Comparison of distance-vector and link-state algorithm, Computer Networking


  • It is easy to implement.
  • Packet switch modifies its own routing table first.
  • It is used in RIP.


  • It is very complex.
  • Switches operates independent computations.
  • It is used in OSPF.
Posted Date: 7/31/2012 7:10:45 AM | Location : United States

Related Discussions:- Comparison of distance-vector and link-state algorithm, Assignment Help, Ask Question on Comparison of distance-vector and link-state algorithm, Get Answer, Expert's Help, Comparison of distance-vector and link-state algorithm Discussions

Write discussion on Comparison of distance-vector and link-state algorithm
Your posts are moderated
Related Questions
In this part, we shall talk about about message passing libraries. In history, various message passing libraries have been available since the 1980s. These executions differed subs

Question: a) Explain briefly three typical network topologies giving one advantage and one disadvantage of each topology. Explain the three topologies with appropriate diagrams

Alice sends a message to Bob, encrypted with a symmetric key. Bob decrypts the message and finds it is a purchase order for an expensive workstation. When the time comes to deliver

What is ARCNet? The  Attached  Resource Computer Network (ARCNet) standard was formed in 1977 at the Data Point Corporation by a scientist  -  John Murphy. ARCNet uses the toke

Consider a signal x(t) = 10 cos(2πfct + 4 cos 2πfmt). Assume frequency modulation. The message frequency fm = 2:3 kHz. Calculate the modulation index and find the bandwidth when

Cube: It's a 3 dimensional interconnection network.  In Cube PE s   are organised in a cube structure.  Figure 11: Cube interconnection network

bus topology disadvantage?

can you help me convert binary into decimals?

DEFINITION: Latency = Delay. Because a store and forward switch reads the entire frame before forwarding, a larger frame takes longer than a shorter frame.

a) Consider a hypothetical arrangement of ‘self-learning' bridges shown in the figure below. Assuming all are initially empty, give the forwarding tables for each of the bridges B