Difference between Distance vector, Link state protocols
Answers were Sorted based on User's Feedback
Answer / santosh
Distance vector routing is so named because it involves two factors: the distance, or metric, of a destination, and the vector, or direction to take to get there. Routing information is only exchanged between directly connected neighbors. This means a router knows from which neighbor a route was learned, but it does not know where that neighbor learned the route; a router can't see beyond its own neighbors. This aspect of distance vector routing is sometimes referred to as "routing by rumor." Measures like split horizon and poison reverse are employed to avoid routing loops.
Link-state routing, in contrast, requires that all routers know about the paths reachable by all other routers in the network. Link-state information is flooded throughout the link-state domain (an area in OSPF or IS-IS) to ensure all routers posess a synchronized copy of the area's link-state database. From this common database, each router constructs its own relative shortest-path tree, with itself as the root, for all known routes.
| Is This Answer Correct ? | 7 Yes | 1 No |
Answer / samyak
Distance Vector Protocol :
1-->Susceptible for routing loop
2-->Send updates periodically
3-->limited hop count
4-->send entire routing table to all of its neighbor
5-->Use Bell-ford algorithm
Link State Protocol :
1-->Provide loop free path
2-->Create topology table to find out best path to
destination network .
3-->send triggered update ,when topology changes.
4-->support unlimited hop count
5-->Use SPF algorithm to find out best path
| Is This Answer Correct ? | 2 Yes | 0 No |
Answer / jitendera
In distance vector routing protocol routing update will
send in the direction from the direction it is coming
in the link state the routing update will not be forwarded
from the direction it is coming
| Is This Answer Correct ? | 3 Yes | 4 No |
Identify the switching method that examines the destination MAC address as the frame is being received then begins forwarding the frame prior to receiving the entire frame? A.) Fragment-free B.) Store and Forward C.) Cut-through D.) Fast forward
Cisco routers can secure the enable password with a one-way hash algorithm. What command would encrypt the enable password with the strong encryption method? A.) enable encrypt john B.) password john C.) enable secret john D.) enable password john E.) secret john F.) enable password 5 john
. Which command sequence will allow only traffic from network 185.64.0.0 to enter interface s0? A. access-list 25 permit 185.64.0.0 255.255.0.0 int s0 ; ip access-list 25 out B. access-list 25 permit 185.64.0.0 255.255.0.0 int s0 ; ip access-group 25 out C. access-list 25 permit 185.64.0.0 0.0.255.255 int s0 ; ip access-list 25 in D. access-list 25 permit 185.64.0.0 0.0.255.255 int s0 ; ip access-group 25 in
I simulate ten routers r1 to r10 straightly. I want I can ping from the loop of r1 to loop of r10, but I want I cant ping r1 and r10 from inside routers.?
You are a network administrator and have been assigned the IP address of 201.222.5.0. You need to have 20 subnets with 5 hosts per subnet. What subnet mask will you use? A. 255.255.255.248 B. 255.255.255.128 C. 255.255.255.192 D. 255.255.255.240
Novell NetWare has an Ethernet frame type called Ethernet_II. What is the matching Cisco command line keyword for this encapsulation method? A.) dix B.) sap C.) arpa D.) gns E.) snap F.) novell-ether
Mention what is the difference between dynamic ip and static ip addressing?
Is hub intelligent device?
Which IP Address Class can have 16 million subnets but support 254 hosts? A. Class C B. Class A C. Class B D. Class D
Switching methods include cut-through, store and forward, and a modified version of the first two methods. Which statement about switching methods is true? A. The store and forward method has low latency B. The cut through method of switching has high latency C. The modified version holds the packet in memory until 50 percent of the packet reaches the switch D. The modified version holds the packet in memory until the data spoon of the packet reaches the switch
Your Ethernet interface currently has the IP address of 1.1.1.1/24. You would like it to have a second IP address of 2.2.2.2/24. Which command will do that? A.) ip address 1.1.1.1 2.2.2.2 255.255.255.0 B.) ip address 2.2.2.2 255.255.255.0 secondary C.) ip address 2.2.2.2 255.255.255.0 D.) This cannot be done, you can only have 1 IP address per physical interface. E.) ip address 2.2.2.2 /24
What is hsrp?