what is the main features of link state routing protocols?
Answer / vikramsingh11
Link-state algorithms are also known as Dijkstras algorithm
or as SPF (shortest path first) algorithms.
Link-state routing algorithms maintain a complex database of
topology information.
The distance vector algorithm are also known as Bellman-Ford
algorithms. They have nonspecific information about distant
networks and no knowledge of distant routers.
A link-state routing algorithm maintains full knowledge of
distant routers and how they interconnect. Link-state
routing uses:
Link-state advertisements (LSAs)
A link-state advertisement (LSA) is a small packet of
routing information
that is sent between routers.
Topological database
A topological database is a collection of information
gathered from LSAs.
SPF algorithm
The shortest path first (SPF) algorithm is a calculation
performed on the
database resulting in the SPF tree.
Routing tables – A list of the known paths and interfaces
Is This Answer Correct ? | 1 Yes | 1 No |
When we use standard access-list?
Windowing is a type of : A.) Negative acknowledgement B.) Address resolution C.) Layer transition mechanism D.) Flow control
What is VLSM? how to Calculate VLSM? where it is use and why?
What is the extended IPX access list range? A.) 901-1000 B.) 100-199 C.) 900-999 D.) 1000-1000
What do the following commands accomplish? access-list 1 permit 172.16.0.0 0.0.255.255 interface ethernet 0 IP access-group 1 out interface ethernet 1 IP access-group 1 out A. Only traffic from the source network 172.16.0.0 will be blocked. B. Only traffic from the source network 172.16.0.0 will be forwarded. Non-172.16.0.0 network traffic is blocked. C. Non-172.16.0.0 traffic will be forwarded. D. All traffic will be forwarded.
How can you measure out exactly 4 litres of water from a tap using a 3 litre and a 5 litre bucket?
Which type of switching is considered to be 'wire speed?' A.) Cut-Through B.) Multiplexed C.) Inverted D.) Layer 4 E.) Store and Forward F.) Layer 3
You have OSPF traffic flooding your network via one of your router interfaces. Write the access list line that will deny all ospf traffic. Don't worry about the other lines of the access list.
What is a network subnet?
What are the different types of passwords that you can use in cisco routers?
Which processes does TCP, but not UDP, use? A. Windowing B. Acknowledgements C. Source Port D. Destination Port
Which layer is responsible for flow control, acknowledgement, and windowing? A.) Transport B.) Network C.) Application D.) Session E.) Physical F.) Data Link