Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Shortest path
The dijkstra algorithms four steps to discover what it called the shortest path tree .
a.The algorithm beings to build the tree identifying its root. The root of each router tree is the router itself. The algorithm them attaches all nodes that can be reached from that root in other words. All of the other neighbour nodes and are are temporary at this step.
b.The algorithm compares the tree temporary acres and identifies the are with the lowest commutative cost. This are and the node to which it connecters are now a permanent part of shortest path tree.
c.The algorithm examines the database and identifies every node that can be reached from it chosen node. These nodes and their arcs are added temporarily to the tree.
d.The last two steps are repeated until every node in the network has become a permanent part of the tree. The only permanent arcs are those that represent the shortest route to every node.
The cost number next to each node represents the cumulative cost from the root node not the cost of the individual arc. The second third steps repeated until four more nodes have becomes permanent.
Q. What is Transmission Control Protocol? Transmission Control Protocol TCP Services - Stream delivery service Permits the sending process to deliver data as a stream
advantage og stored program control automation
BRDGING BETWEEN BUILDINGS: If two buildings are placed far from each other, a bridge, a pair of fiber modems and an optical fiber may be used to locate two LANs as given in t
Example of transport layer are:- a) TCP is connection oriented. b) UDP is connectionless
What are the benefits of wireless devices One benefit is that if everyone uses standard, everyone can talk to anyone. Another benefit is that extensive use of any standard will
Explain in brief about the Throughput The medium access control protocol should make as well-organized use as possible of the wireless medium to maximize capacity. Number of
What is a Transaction server? With a transaction server, the client includes remote procedures that reside on the server with an SQL database engine. These remote processes on
WAN interface card(WIC) slots Two fixed WIC slots are present in 2600 series router except 2691. It has contained 3 WIC slots. Network Module Expansion Slot( NM) slot
Different layers of OSI Model ?
Data Routing Functions The data routing functions are functions that when executed set the path between source and destination. In dynamic interconnection networks there may be
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd