Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
MOSPF
MOSPF is multicast extension to OSPF. This protocol is extension of OSPF which is a unicast routing protocol which make MOSPF a combination of unicast and multicast protocol. MOSPF was documented in RFC1584 in the year 1994, since then no other version of the protocol has been deployed.
Rouse (2008) states "MOSPF (Multicast Open Shortest Path First) is an extension to the OSPF (Open Shortest Path First) protocol that facilitates interoperation between unicast and multicast routers."
MOSPF do not exchange any messages with neighbours for developing any multicast distribution trees. The routers employed in the network flood the information of location of all the receivers and distribution trees are calculated by MOSPF by its own. Due to this, all routers have same information so same trees will be calculated and there is no need of any designated forward mechanism or designated, assert router are required.
Advantages for MOSPFRP are not necessary to be defined
Disadvantages of MOSPF• Scalability is limited• The protocol does not support SSM
Q. Example on Multiplicative Decrease? w = 1 for (each new ACK received) w = w+1 until (loss detected or w >= ssthresh) Not so slow - Exponential increase
What is autonomous system? It is a collection of routers under the control of a one administrative authority and that uses a common Interior Gateway Protocol.
discuss the communication model from the source to the destination including the detailed account of the task that must be performed in data communication system
Can you describe RSVP?
Describe Concept of Simplex, Half Duplex and Full Duplex dialogs?
What is VRC? It is the most common and least costly mechanism for Error Detection. In VRC, a parity bit is added to each data unit so that the total number of 1s becomes even f
Question: a) In a wireless network where WEP is enforced as security mechanism, what procedure would the network manager adopt for changing WEP default keys. b) Using Pla
Fully connected : It is the most powerful interconnection topology. In this every node is directly associated to all other nodes. The limitation of this network is that it needs t
Q. What are the Tools sued for Cryptography and Web Security? Tools - Cryptography VPN - remote access PGP - email Dedicated Circuits -tunnels' - IPSec
The auxiliary port is used to link a modem to for dial backups.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd