(Accenture)1. Write a distance vector algoritam
2. TCP/IP 3 way hand shake
Answers were Sorted based on User's Feedback
Answer / dev kumar
Distance vector-based routing algorithms (also known as
Bellman-Ford algorithms) pass periodic copies of a routing
table from router to router.
When the topology in a distance vector protocol
internetwork changes, routing table updates must occur. As
with the network discovery process, topology change updates
proceed step-by-step from router to router.
When maintaining the routing information, inconsistencies
can occur if the internetwork’s slow convergence on a new
configuration causes incorrect routing entries.
| Is This Answer Correct ? | 9 Yes | 3 No |
Answer / ba
Distance vector protocol uses the bellman-fort algorithm.
it has 6 steps
1.increments the materic of the incoming route in the
advertisement.(counts the hops values)
2.Compare the n/w address in routing updaate from the
neighbor to wt the router has in the routing table.
3.if the neighbor information is better. it places the new
update in routing table, and delete the old entry.
4.if neighbor's information is worse, it ignors that.
5.if the neighbor update same as in routing table it resets
the timer for entry in the routing table.
6. if the neighbor's information is different path to same
destination, it stores the route in the routing table.
in the distance RIP doesnt support the un-equal paths.
| Is This Answer Correct ? | 6 Yes | 3 No |
Answer / amrendra kumar
1.distance vector protocol work on Bellman–Ford algorithm,
2. SYN,SYN-ACK,ACK
| Is This Answer Correct ? | 1 Yes | 0 No |
how to configure ras in router 2600
when affected the system from virus , which paths will be it stored in system ?
Which layer is responsible for providing mechanisms for multiplexing upper-layer application, session establishment, and tear down of virtual circuits? * Session * Network * Physical * Transport * Application * Presentation
Windowing happens at which layer ? a. network b. transport c. session d. presentation
what is ppl
How would you monitor and maintain the local area network, email, internet & intranet systems to ensure data security and prevent occurrence of faults?
You try "ping server1" and you get "host not reachable.." . Why ?
What entry in the /etc/gateways file would define a route to the host called host9 via the gateway whose IP address is 192.100.100.5? Assume that host9 is 2 hops away and that the gateway IS expected to exchange RIP information.
What are the drawbacks of implementing a ring topology?
Define mesh topology?
Cached ethernet addresses are stored for about 5 minutes and is used to avoid a rebroadcast. This is called ____________ .
how can i login without password through ssh