Modeling a wan, Computer Networking

To model a WAN, we need a graph in which the nodes model switches and the edges model direct join between switches. The modeling saves essence of network, and it ignores attached devices as given in the figure below. Modeling of a specific WAN is described.

678_modelling a wan.png

 

ROUTE COMPUTATION WITH A GRAPH:

We can show routing table with edges as given in the figure below:

377_modelling a wan1.png

The graph algorithms can be used to find routes.

Posted Date: 7/31/2012 6:54:24 AM | Location : United States







Related Discussions:- Modeling a wan, Assignment Help, Ask Question on Modeling a wan, Get Answer, Expert's Help, Modeling a wan Discussions

Write discussion on Modeling a wan
Your posts are moderated
Related Questions
ATM designers select cells over packets because of the following facts: Cells are fixed length and memory management for them is easy. Handling variable length packets tends

Genome4U is a scientific research project at a large university in the United States. Genome4U has recently started a large-scale project to sequence the genomes of 250,000 volun

A mobile host (MH) is connected to a WLAN access network that uses MIP for mobility support. Consider that the RTTs between MH and HA are 0.3s while RTTs within a L2 subnet are 80

Q. Why congestion occurs? Congestion Emerge if the load on the network is greater than the capacity of the network - Load that is the number of packets sent to the net

INTERNETWORKING - TCP/IP 1. State the following terminologies: a) Node b) Router c) Host d) Subnet e) Network 2. What do you understand by IEEE 802 Local Area network 3.

Describe about the noiseless channel A noiseless channel can transmit an arbitrarily large amount of information, no matter how frequently it is sampled. Just send a lot of dat

What are the Advantages of adaptive routing  (1) An adaptive routing method can improve performance, as realised by the network user. (2) An adaptive routing method can aid

Advantages of Bridges By forwarding  frames  only to  the segment  where  host  resides  a bridge server the  following  purpose. a.Unwanted  traffic  as well  as network  c

Protocol Layers and their Service Models The  internet is an extremely complicated system. It  consists of many  pieces like  numerous  applications and protocols  various  t

Control Frame: claim_token Consider first station turned on Station notices no tokens Sends claim_token No competitors, so makes a ring of just itself P