Ospf - open shortest path first , Computer Networking

OSPF ( open Shortest Path First)

Open shortest  path first  is a routing  protocols  developed for internet protocols networks by the  interior  gateway protocols working group  of the  internet  engineering task force.

OSPF has two primary  characteristics. The first is  that is  protocols  is open  which  means  that its  specification  is the public domain. The second  principle  characteristics is that  OSPF is based on the SPF  algorithm, which sometimes is referred to as the  dijkstra algorithm. OSPF accumulate link state information they  use the SPF algorithm to calculate the shortest path  to each node.

Posted Date: 3/16/2013 3:40:20 AM | Location : United States







Related Discussions:- Ospf - open shortest path first , Assignment Help, Ask Question on Ospf - open shortest path first , Get Answer, Expert's Help, Ospf - open shortest path first Discussions

Write discussion on Ospf - open shortest path first
Your posts are moderated
Related Questions
Explain Logical Ring Physical Star topology for Token-Passing Standard. It is definite that any break in the ring at any point will interrupt communications for all machines.

What is on electronic payment system? Electronic payment systems are alternative cash credit payment methods using several electronic methods to pay for products and services in


Process of Securing an Intranet Securing an Intranet is not a simple task. Mere installation of firewall hardware and software would not help the Intranet to protect itself. P

Hypercube Network The hypercube architecture has played a vital role in the development of parallel processing and is still not much popular and influential. The highly symmetr

What is Intranet security Every company starts its operations with a genuine and honest thinking. As time passes, based on the needs of its employees as well as customers, a nu

What are the Advantages of adaptive routing  (1) An adaptive routing method can improve performance, as realised by the network user. (2) An adaptive routing method can aid

Question : a) Give three examples of vulnerable services which are among the overwhelming majority of successful attacks. b) Name the five outside sources which can be the

We know that all processors share a common memory in shared memory model. Every processor, however, can be assigned a different part of the program stored in the memory to implemen

DNS in the Internet -Domain name space is split into three sections: country, generic and inverse -Generic domains define hosts by generic behavior -Country domains are