What is the future for routing through the protocols

Assignment Help Computer Networking
Reference no: EM131875903

Discussion Board

The Discussion Board (DB) is part of the core of online learning. Classroom discussion in an online environment requires the active participation of students and the instructor to create robust interaction and dialogue. Every student is expected to create an original response to the open-ended DB question as well as engage in dialogue by responding to posts created by others throughout the week. At the end of each unit, DB participation will be assessed based on both level of engagement and the quality of the contribution to the discussion.

At a minimum, each student will be expected to post an original and thoughtful response to the DB question and contribute to the weekly dialogue by responding to at least two other posts from students. The first contribution must be posted before midnight (Central Time) on Friday of each week. Two additional responses are required after Friday of each week. Students are highly encouraged to engage on the Discussion Board early and often, as that is the primary way the university tracks class attendance and participation.

The purpose of the Discussion Board is to allow students to learn through sharing ideas and experiences as they relate to course content and the DB question. Because it is not possible to engage in two-way dialogue after a conversation has ended, no posts to the DB will be accepted after the end of each unit.

Networks use different routing protocols to select the best routing path to reach other networks. A distance-vector routing uses a set of protocols (IPX, SPX, IP, or DECnet) and a distance calculation through an outgoing network interface to select the most efficient path to a network destination.

Link-state routing protocols track the connection status and type to each link that comes from a network. The criteria for selection are links with greater hops and faster mediums. Those are considered the most efficient links that will be used by the routing protocols.
Discuss the following for this assignment:

• Do you think that most network administrators understand and use both distance-vector and link-state protocols? Why?

• In your opinion, are there other options that can perform the tasks of these protocols? What is the future for routing through these protocols? Explain.

In your own words, please post a response to the Discussion Board and comment on other postings. You will be graded on the quality of your postings.

For assistance with your assignment, please use your text, Web resources, and all course materials.

Reference no: EM131875903

Questions Cloud

Discuss the stages of change model : Of what benefit does the Stages of Change model offer to the health care manager who wants to encourage efficiency and the highest standards of service?
Explain the concepts of change management theory : You have been assigned to address these multiple issues of ethics, standards of conduct, truth, and fairness. Also describe what concepts of change management.
Explain the issue you are examining : Explain why this area is important to the general area under study (e.g., psychology of language, second language acquisition, teaching methods)
Explain the importance of measurement criteria : Explain the importance of measurement and developing criteria for efficiency, effectiveness, performance, efficacy, and quality in health organizations.
What is the future for routing through the protocols : In your opinion, are there other options that can perform the tasks of these protocols? What is the future for routing through these protocols? Explain.
Find new ways to achieve an economic scale in operations : You are the president of a multi hospital system that is growing at a rapid pace. There are strains on resources, and pressures to find new ways to achieve.
Describe the values of the two business intelligence tools : Estimate the costs and describe the values of the two business intelligence tool you have identified from Part 1 of the discussion based on their functionality.
Summarize the key parameters of the juvenile justice system : Write a 700- to 1,050-word paper summarizing the key parameters of the juvenile justice system in the United States.
Explain a current event item related to hospitality industry : Please research, read and explain a current event item (1/2 page executive summary) related to the hospitality industry and a security or risk issue.

Reviews

Write a Review

Computer Networking Questions & Answers

  Encapsulate ftp datagram into tcp datagram

Segmentation of a file and forming FTP datagrams: Read first 'x' number of bytes and use them as part of payload section of an FTP datagram. Encapsulate the FTP datagram into TCP datagram (generation of TCP packets)

  Find a bit-inverter turing machine

Find a Turing machine that recognizes the set of palindromes on {0, 1}*, that is, the set of all strings in {0, 1}* that read the same forward and backward.

  Write a research and report on network management tools

Network Management Paper: In this paper, you will research and report on network management tools associated with (1) policy compliance, (2) bandwidth management, and (3) asset management.

  How to install the subversion package

Implement con guration and runtime options that increase security|explaining why your choices increase security.

  Describe the valid mailbox identifiers

A user receives mail in which the To field specifies the string important-people. The mail was sent from a computer on which the alias important-people.

  Optimal algorithm for mutual exclusion in computer networks

In Ricart and agrawala's An optimal algorithm for mutual exclusion in computer networks paper if we are updating the code with taking the priorities.

  A small picture that represents a command

A small picture that represents a commandA small picture that represents a command

  Explain subnet mask information for departments and routers

Write a 1-2 page paper listing configuration changes to present to the manager, who has technical background, which details the plan and your timeline for implementation.

  Part 1in your own words answer the following questionswhat

part 1in your own words answer the following questionswhat is network infrastructure management? what are the

  Describe the components of rfid systems

Explain RFID and describe the components of RFID systems. Include in your discussion some of various RFID security and privacy threats.

  Ipv6 give operational improvement-increased address space

What are some immediate differences in the two protocols? Does IPv6 provide operational improvement, as well as increased address space?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd