Packet cost - network layer and routing , Computer Networking

Packet  Cost

Both  distance vector and link  state  routing  are lowest  algorithms. Tow factors  govern  how  cost is applied to packets  in determines  a route.

Cost  is applied  only by  routers  and not by  any other  stations on a network. Remember the link  from router  to the next  is a network  not a  point to point  cable. In many  topologies  every stations  on the  network example  of every packet that phase. If cost  was added  by every  station. Instead of by routers  alone. It would  accumulate  unpredictably ( the  number of station in a network  can change for a variety of reasons  many of them predictable.

Cost is applied  as a packet  leaves  the router  rather than as it enters. Most  networks  are broadcast network. When  a packet  is in the network  every station including  the router  can  pick it up therefore were  cannot  assign  any cost  to a packet  when it goes form  a network  to a router.

5_Packet  Cost.png

                                                                            figure cost in link state routing

Posted Date: 3/16/2013 3:09:50 AM | Location : United States







Related Discussions:- Packet cost - network layer and routing , Assignment Help, Ask Question on Packet cost - network layer and routing , Get Answer, Expert's Help, Packet cost - network layer and routing Discussions

Write discussion on Packet cost - network layer and routing
Your posts are moderated
Related Questions
can you help me convert binary into decimals?

List the advantages of ARCNet. Here are some of the ARCNet's benefits: 1.  It is extremely reliable. 2. ARCNet is simple to install and troubleshoot. 3. It has an exce

Operating system for Server Since 1994, when the original pair of web servers - NCSA HTTPd and CERN HTTPd , were proposed, dozens of commercial and shareware programs have

Q. Show the RS232 Logic Waveform ? RS-232 Interface Three most important wires for the Serial interface Transmit - Pin 2 Receive - Pin 3 Ground - Pin

Solve the following CPM/PERT Network Analysis problem: Given the following network and activity time estimates, determine earliest and latest activity times, slack, the expecte

Process communicating End   systems  communicate with each  other by the  processes. A process  can be  thought  of a s program  that is  running  within  end systems. Process

Q. What is Authentication ? - Verification of sender's identity. - Accomplished through a digital signature, which is based on public key encryption/decryption. - Uses re

Data Sharing One of the most important uses of networking is to allow the sharing of data. Before networking was common an accounting employee who wanted to prepare a report f

This assignment consists of both combinational logic circuit and analog counterpart to perform logical operations based on the given conditions. The first objective of this assignm