Packet cost - network layer and routing , Computer Networking

Assignment Help:

Packet  Cost

Both  distance vector and link  state  routing  are lowest  algorithms. Tow factors  govern  how  cost is applied to packets  in determines  a route.

Cost  is applied  only by  routers  and not by  any other  stations on a network. Remember the link  from router  to the next  is a network  not a  point to point  cable. In many  topologies  every stations  on the  network example  of every packet that phase. If cost  was added  by every  station. Instead of by routers  alone. It would  accumulate  unpredictably ( the  number of station in a network  can change for a variety of reasons  many of them predictable.

Cost is applied  as a packet  leaves  the router  rather than as it enters. Most  networks  are broadcast network. When  a packet  is in the network  every station including  the router  can  pick it up therefore were  cannot  assign  any cost  to a packet  when it goes form  a network  to a router.

5_Packet  Cost.png

                                                                            figure cost in link state routing


Related Discussions:- Packet cost - network layer and routing

Define what is a software agent, QUESTION (a) Define what is a software...

QUESTION (a) Define what is a software agent? (b) An intelligent agent is known to exhibit several characteristics or properties that distinguish it from another piece of so

Explain communications channels, A communications channel is pathways over ...

A communications channel is pathways over which information can be communicate. It may be described by a physical wire that connects communicating devices, or by a radio, laser, or

Explain the authentication header (ah) protocol, Can you explain the Authen...

Can you explain the Authentication Header (AH) Protocol?

Network interface hardware, NETWORK INTERFACE HARDWARE:  CPU can't ope...

NETWORK INTERFACE HARDWARE:  CPU can't operate data at network speeds. So in order to connect to the network device systems use special purpose hardware for network connection

Firewall rules based on a fictitious organisation, Question 1 requires you ...

Question 1 requires you to develop firewall rules based on a fictitious organisation. Scenario: You work for a security-conscious company, xC-Cure, who develop encryption t

Determine teh term - selection of computing infrastructure, Selection of co...

Selection of computing infrastructure The computing equipment on an Intranet must be selected in such a manner that they do not get obsolete very quickly or become too costly f

Explain dynamic key management mechanism, Question: a) Consider the f...

Question: a) Consider the following MIP scenario. Quite a few enterprise networks use private addresses and NAPT for the communication to the Internet. i. Discu

Cpm-pert network analysis problem, Solve the following CPM/PERT Network Ana...

Solve the following CPM/PERT Network Analysis problem: Given the following network and activity time estimates, determine earliest and latest activity times, slack, the expecte

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd