Computes their distance vector for network, Computer Networking

Consider the following network example. Suppose that the distance vector (DV) routing algorithm is used to compute the distance between nodes.

855_original network.png

(a) Show the procedure of nodes X, Y and W computes their Distance Vector for network illustrated by Figure (a), i.e., link costs are C(xw)=1, C(xy)=4, and C(yw)=8.

Answer: In the following, each column shows the node X, Y and Z's table update respectively:

2345_node of table.png

(b)  Assume that after the DV is computed by all nodes, the link cost of xy changed from 4 to 20. Show the procedure of nodes X, Y and W updates their Distance Vector for network illustrated by Figure (b), i.e., link costs are C(xw)=1, C(xy)=20, and C(yw)=8.

Posted Date: 3/20/2013 5:51:31 AM | Location : United States







Related Discussions:- Computes their distance vector for network, Assignment Help, Ask Question on Computes their distance vector for network, Get Answer, Expert's Help, Computes their distance vector for network Discussions

Write discussion on Computes their distance vector for network
Your posts are moderated
Related Questions
Consider the similar conditions as the last problem, except for the following: what's the minimum possible response time for the 1 Gbps and a 1 Mbps line?  What does the diffrentia

Mention and explain 16 bit, basic programmable registers in 8086 operated in real mode?

Explain Client/Server Networking Model. A networking model where one or more powerful  computers (servers) give the dissimilar network services and all other user's computers (

What is Frequency borrowing In the simplest case, frequencies are taken from adjacent cells by congested cells. The frequencies can also be assigned to cells dynamically.


Simple Mail Transfer Protocol ( SMTP) SMTP is the principal  application layer protocol for  internet electronic  mail. It uses the reliable data transfer  service of TCP  to

Cost Involved in Inter-Processor Communication As the data is assigned to many processors in a parallel computer while implementing a parallel algorithm, the processors might

Process of Securing an Intranet Securing an Intranet is not a simple task. Mere installation of firewall hardware and software would not help the Intranet to protect itself. P

Physical Configurations Transport signal multiplexer de multiplexer. It either  signal from multiple   sources into a STS singles  or de multiplexes and STS signal  into diffe

Explain the transport layer in detail Transport Layer: Transport layer ensures and controls the end-to-end integrity of data message propagated via the network  amid two devic