What is the future for routing through the protocols

Assignment Help Computer Networking
Reference no: EM131875903

Discussion Board

The Discussion Board (DB) is part of the core of online learning. Classroom discussion in an online environment requires the active participation of students and the instructor to create robust interaction and dialogue. Every student is expected to create an original response to the open-ended DB question as well as engage in dialogue by responding to posts created by others throughout the week. At the end of each unit, DB participation will be assessed based on both level of engagement and the quality of the contribution to the discussion.

At a minimum, each student will be expected to post an original and thoughtful response to the DB question and contribute to the weekly dialogue by responding to at least two other posts from students. The first contribution must be posted before midnight (Central Time) on Friday of each week. Two additional responses are required after Friday of each week. Students are highly encouraged to engage on the Discussion Board early and often, as that is the primary way the university tracks class attendance and participation.

The purpose of the Discussion Board is to allow students to learn through sharing ideas and experiences as they relate to course content and the DB question. Because it is not possible to engage in two-way dialogue after a conversation has ended, no posts to the DB will be accepted after the end of each unit.

Networks use different routing protocols to select the best routing path to reach other networks. A distance-vector routing uses a set of protocols (IPX, SPX, IP, or DECnet) and a distance calculation through an outgoing network interface to select the most efficient path to a network destination.

Link-state routing protocols track the connection status and type to each link that comes from a network. The criteria for selection are links with greater hops and faster mediums. Those are considered the most efficient links that will be used by the routing protocols.
Discuss the following for this assignment:

• Do you think that most network administrators understand and use both distance-vector and link-state protocols? Why?

• In your opinion, are there other options that can perform the tasks of these protocols? What is the future for routing through these protocols? Explain.

In your own words, please post a response to the Discussion Board and comment on other postings. You will be graded on the quality of your postings.

For assistance with your assignment, please use your text, Web resources, and all course materials.

Reference no: EM131875903

Questions Cloud

Discuss the stages of change model : Of what benefit does the Stages of Change model offer to the health care manager who wants to encourage efficiency and the highest standards of service?
Explain the concepts of change management theory : You have been assigned to address these multiple issues of ethics, standards of conduct, truth, and fairness. Also describe what concepts of change management.
Explain the issue you are examining : Explain why this area is important to the general area under study (e.g., psychology of language, second language acquisition, teaching methods)
Explain the importance of measurement criteria : Explain the importance of measurement and developing criteria for efficiency, effectiveness, performance, efficacy, and quality in health organizations.
What is the future for routing through the protocols : In your opinion, are there other options that can perform the tasks of these protocols? What is the future for routing through these protocols? Explain.
Find new ways to achieve an economic scale in operations : You are the president of a multi hospital system that is growing at a rapid pace. There are strains on resources, and pressures to find new ways to achieve.
Describe the values of the two business intelligence tools : Estimate the costs and describe the values of the two business intelligence tool you have identified from Part 1 of the discussion based on their functionality.
Summarize the key parameters of the juvenile justice system : Write a 700- to 1,050-word paper summarizing the key parameters of the juvenile justice system in the United States.
Explain a current event item related to hospitality industry : Please research, read and explain a current event item (1/2 page executive summary) related to the hospitality industry and a security or risk issue.

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd