Computes their distance vector for network, Computer Networking

Consider the following network example. Suppose that the distance vector (DV) routing algorithm is used to compute the distance between nodes.

855_original network.png

(a) Show the procedure of nodes X, Y and W computes their Distance Vector for network illustrated by Figure (a), i.e., link costs are C(xw)=1, C(xy)=4, and C(yw)=8.

Answer: In the following, each column shows the node X, Y and Z's table update respectively:

2345_node of table.png

(b)  Assume that after the DV is computed by all nodes, the link cost of xy changed from 4 to 20. Show the procedure of nodes X, Y and W updates their Distance Vector for network illustrated by Figure (b), i.e., link costs are C(xw)=1, C(xy)=20, and C(yw)=8.

Posted Date: 3/20/2013 5:51:31 AM | Location : United States







Related Discussions:- Computes their distance vector for network, Assignment Help, Ask Question on Computes their distance vector for network, Get Answer, Expert's Help, Computes their distance vector for network Discussions

Write discussion on Computes their distance vector for network
Your posts are moderated
Related Questions
Q. Modem stands for modulator - demodulator ? - Modulator are to creates an analog signal from binary data - Demodulator are to recovers the binary data from the modulated s

Ajax is a relatively new set of techniques that, in a sense, implement some of the functionalities originally provided by RPC. Ajax is primarily used to build web applications with

TP Monitor does mainly two things extremely well. They are Process management and Transaction management? They were originally introduced to run classes of applications that co

Network throughput It is a symptomatic measure of the message carrying capability of a network. It is termed as the total number of messages network can send in per unit time.

confiriguration,capabilities,implementation

What is a binary semaphore? What is its use? A binary semaphore is takes only 0 and 1 as values. They are used to execute mutual exclusion and synchronize concurrent p


Q. Explain the Communication Channel Threats? Secrecy Threat - Secrecy is the avoidance of unauthorized information disclosure - Privacy is the guard of individua

State in brief about the Information Access Intranet This type of Intranet is the type commonly found on the World Wide Web. The static web page may include information on

Consider figure.  Assume a new flow E is added that takes a path from R1 to R2 to R6. How does the max-min bandwidth allocation change for the 5 flows?