what is meant by wild card mask and why can't we use in eigrp
?
Answers were Sorted based on User's Feedback
Answer / biswajit biswas, kolkata
Wild card masks are nothing but inverted subnetmasks. A wild
card mask is necessary for configuring OSPF networks because
OSPF supports both VLSM & CIDR unlike RIP & IGRP.
Although EIGRP supports VLSM, it is a hybrid protocol
because of its inherent distance vector protocol properties
- EIGRP configured with network number followed by subnet
mask like RIP & IGRP.
Is This Answer Correct ? | 16 Yes | 6 No |
hi dudes.......
i have one dought regarding wildcard mask usage in eigrp......
why cant we use wildcard mask in eigrp........where i think
we can use wild card mask in eigrp.
and wildcard mask is most effective then subnetmask...
even i use wild card when i use eigrp routing at some
circumstances...
instead if you want to know do this
router eigrp 10
net 192.168.10.0 ?
here you can see that
Is This Answer Correct ? | 4 Yes | 0 No |
Explain the difference between flsm and vlsm?
What does protocol mean?
Explain what is the default behavior of access-list?
Identify the 3 characteristics of IPX RIP? A.) Distance vector B.) Does not support multiple paths C.) 60 second updates D.) Default encapsulation is SAP E.) Uses ticks and hop count as a metric
which of the following address represent unicast address A 224.1.5.2 B ffff.ffff.ffff.ffff C 192.168.24.59/30 D 255.255.255.255 E 172.138.128.255 plz tell what should be answer plz tell with explanation
what are the 3ree way for implementing vlan on cisco switches what is the layer hierarchy of the cisco what is the best place of implementing standard access list what is q stand for isdn these are the challanging question for me i am waiting for jitendera sinha answer(it is challenge for u i have seen lots of answer given by u )it is a challenge in the frendshipmode plz donot take other wise
Identify the 2 commands that save the running-config to a TFTP server? A.) write running tftp B.) copy running network C.) copy running tftp D.) write network
Which of the following describe SMTP? A.) Used for downloading files to the router. B.) Used for sending e-mail. C.) Uses TCP. D.) Uses UDP. E.) Uses port 25. F.) Used for managing IP devices.
Choose three reasons why the networking industry uses a layered model: A.) It facilitates systematic troubleshooting B.) It allows changes in one layer to occur without changing other layers C.) It allows changes to occur in all layers when changing one protocol D.) It clarifies how to do it rather than what general function to be done E.) It clarifies what general function is to be done rather than how to do it
Which LAN switching method is used in CISCO Catalyst 5000?
Identify the command that forces the router to load into ROM mode upon a reload? A.) boot system rom B.) rom boot C.) boot system flash rom D.) boot router rom
In port based access-list which command u give instead of ip?