Explain the purpose of the dr and bdr, Computer Network Security

Assignment Help:

QUESTION

a) Compare and contrast between static and dynamic routing.

b) What are the merits (five merits) and limitations (3 limitations) of using Open Shortest Path First (OSPF) as routing protocol as compared to a distance-vector protocol?

c) OSPF routers use their router ID to select a Designated Router (DR) and a Backup Designated Router (BDR) on multi-access networks.

Explain the purpose of the DR and BDR, and how the election process takes place.


Related Discussions:- Explain the purpose of the dr and bdr

Basic types of agent in order of increasing generality, Question 1: (a)...

Question 1: (a) Define Artificial Intelligence. (b) Briefly describe the categories for the definition of Artificial Intelligence. (c) Identify the four basic types of

Need assignemnt help in information security assignemnt, Need Assignemnt he...

Need Assignemnt help in Information security assignemnt

Future threats to network security and planning for those th, I need a help...

I need a help on how to write good assignment on the above topic

Network security, Network security has become much more complex than ever b...

Network security has become much more complex than ever before. New types and sources of network security threats, always-on high-speed Internet connections, wireless networking, a

Firewalls-information security, Firewalls A firewall in an information s...

Firewalls A firewall in an information security program that prevents specific types of information from moving between the outside world and the inside world. The firewall may

CS, Discuss how developers should apply the following countermeasures to im...

Discuss how developers should apply the following countermeasures to improve the security of their code:

routing information exchange and bellman-ford algorithm, You are free to d...

You are free to design the format and structure of the routing table kept locally by each node and exchanged among neighboring nodes. 1. Upon the activation of the program, each

What type of rfid tag is more appropriate for ws-pass, Consider the followi...

Consider the following case study: In order to avoid criticisms of their existing manned road-toll payment system on its private road, WS-Pass has decided to adopt an automated

Software vulnerabilities, 1.  We used the National Vulnerability Database. ...

1.  We used the National Vulnerability Database. Select a recent vulnerability from that Database and analyse it from the following aspects: Criticality level Impact in

Network management, Ask question #MinimAn NMS is connected to a remote netw...

Ask question #MinimAn NMS is connected to a remote network by a 64 Kb/s link. The network elements in the remote network generate 50 faults/second. Of these, 5% are critical and th

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd