Computes their distance vector for network, Computer Networking

Consider the following network example. Suppose that the distance vector (DV) routing algorithm is used to compute the distance between nodes.

855_original network.png

(a) Show the procedure of nodes X, Y and W computes their Distance Vector for network illustrated by Figure (a), i.e., link costs are C(xw)=1, C(xy)=4, and C(yw)=8.

Answer: In the following, each column shows the node X, Y and Z's table update respectively:

2345_node of table.png

(b)  Assume that after the DV is computed by all nodes, the link cost of xy changed from 4 to 20. Show the procedure of nodes X, Y and W updates their Distance Vector for network illustrated by Figure (b), i.e., link costs are C(xw)=1, C(xy)=20, and C(yw)=8.

Posted Date: 3/20/2013 5:51:31 AM | Location : United States







Related Discussions:- Computes their distance vector for network, Assignment Help, Ask Question on Computes their distance vector for network, Get Answer, Expert's Help, Computes their distance vector for network Discussions

Write discussion on Computes their distance vector for network
Your posts are moderated
Related Questions

PROBLEM WITH BROADCASTING: There are some issues with the broadcast. For each broadcast frame on the network every computer uses computational sources and places the data into

Q. Show the Masking process? Masking Take out the address of the physical network from an IP address Used by routers inside the organization

Role of Software in Intranet For an Intranet to be successful, it must have strong software support. In this section, a brief description of the operating system, groupware an

The disadvantages and advantages of Private and Public networks are shown in the table below:

A logic gate drives a load, which has a resistance of 1 kÙ and a capacitance of 20 pF. The printed circuit track connecting the gate to its load has an 40 pF capacitance to ground.

What is a Link? A link refers to the connectivity among two devices. It contains the type of cables and protocols used in order for single device to be able to communicate with

When we specifically block, single router update for other routers

Simulate extremely limited forms of IP and ICMP. You will simulate 6 computers, 4 hosts and 2 routers, that are connected in an imaginary network with the topology as shown belo

Q. What do you mean by Flow Control? - How much data sender is capable to transmit before receiving the ACK - Why flow control? - Limitation with receiver 1. Processin