Comparison of distance-vector and link-state algorithm, Computer Networking

DISTANCE-VECTOR ROUTING:

  • It is easy to implement.
  • Packet switch modifies its own routing table first.
  • It is used in RIP.

LINK-STATE ALGORITHM:

  • It is very complex.
  • Switches operates independent computations.
  • It is used in OSPF.
Posted Date: 7/31/2012 7:10:45 AM | Location : United States







Related Discussions:- Comparison of distance-vector and link-state algorithm, Assignment Help, Ask Question on Comparison of distance-vector and link-state algorithm, Get Answer, Expert's Help, Comparison of distance-vector and link-state algorithm Discussions

Write discussion on Comparison of distance-vector and link-state algorithm
Your posts are moderated
Related Questions
Write discussion on Associative mapping - computer architecture

Question: a) (i) Describe the entire process of credit card processing, identifying the different steps and parties involved. (ii) What are the roles of the acquiring ban

Assume a network as depicted below with a home agent (HA), a foreign agent (FA), a mobile host (MH), and a remote host (RH). The dotted box is the home location of MH. Assume MH's

Telephone companies (Telco's) stated ATM to meet various goals. It gives universal service for all support and subscribers for all users for video, voice and data. It has a single

Uses of fragmentation and reassembly The More bit is used for fragmentation and reassembly. If this bit is 0, then either there has been no fragmentation of this packet or this

Reference models Designing  implementing and  manufacturing  computer  networks  and related  devices  are very  complex  activities. Therefore in order  for this  technolog

Q. Show the Masking process? Masking Take out the address of the physical network from an IP address Used by routers inside the organization

CONNECTION MULTIPLEXING:  In various circumstances transceiver can be in convenient e.g. workstations in a LAN. Connection multiplexer acts multiple computers to a single tran

Explain the uses of Firewall in computer For Intranet developers, restricting access of unauthorised users to the Web site has been the greatest challenge. In addition to preve

Determine about the TCP/IP and OSI model Both models are based on the layered protocols. Both comprise network, transport and application layer. In both the models, transport s