Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What are the IGRP stability features?



What are the IGRP stability features?..

Answer / vikramsingh11

IGRP has a number of features that are designed to enhance
its stability, such as:
Holddowns
Split horizons
Poison reverse updates

Holddowns Holddowns are used to prevent regular update
messages from inappropriately reinstating a route that may
not be up.

Split horizons Split horizons are derived from the premise
that it is usually not useful to send information about a
route back in the direction from which it came.

Poison reverse updates Split horizons prevent routing loops
between adjacent routers, but poison reverse updates are
necessary to defeat larger routing loops.

Today, IGRP is showing its age, it lacks support for
variable length subnet masks (VLSM). Rather than develop an
IGRP version 2 to correct this problem, Cisco has built upon
IGRP's legacy of success with Enhanced IGRP.

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCNA Interview Questions

Identify 3 LAN technologies? A.) FDDI B.) HDLC C.) HSSI D.) X.25 E.) 802.3 F.) 802.5

2 Answers  


Identify the command to configure the router for IGRP autonomous system 100? A.) Router(config)# router igrp 100 B.) Router> router igrp 100 C.) Router# router igrp 100 D.) Router(config)# router igrp

4 Answers  


How the STP determinw that which Port should be Root Port, which port should be Designeted Port , Blocking Port and Forwarding Port in Layer 2 STP topology........ Hi friends Thanks for posting the answer of above given questions i agree with all of you that BPDU is the Protocol that are used to determine this is clear to me.. But I want to Know the Process like Why it Blocked the port Fa0/1 Insted of Fa0/2 waiting for Answer Posting .... Thanks in Advance

5 Answers  


Which layer defines the physical topology? A.) Application B.) Transport C.) Network D.) Data Link E.) Physical F.) Session

1 Answers  


What is ping used for?

0 Answers  


Suppose we have 4 switches runing in VTP mode. So when i create a VLAN in Server Switch this VLAN info reflect in all other switch. So question is - A) Suppose i m practicing this scenario in BOSON software, When a create a VLAN in server switch n ADD ports of switch to that VLAN, the same number of ports of client switch also belongs to dat VLAN. For example - In switch A (Server mode), i create a VLAN 7 name Hyderabad & port number 1, 2 & 3 put into this VLAN. Another Switch B (Client mode), its also showing that port number 1,2 & 3 belong the same VLAN. How cud it possible... As we know, VTP share only VLAN configuration information. Cud anyone explain it please....!!!! B)Same thing, when i m practicing in PACKET TRACER 5.0, its only showing that VLAN configuration information is shared. No port information is shared at all. I can manually configure individual switch port to respective VLAN as our wish. Cud anyone explain it please..!!!

3 Answers  


What is the difference between csma/ca?

0 Answers  


Identify 3 methods used to prevent routing loops? A.) Split horizon B.) Holddown timers C.) Poison reverse D.) SPF algorithm E.) LSP's

2 Answers  


Identify the 3 major functions at layer 3 of the OSI model? A.) Forwarding process B.) Logical addressing C.) End-to-end connections D.) Path selection E.) MAC address examination F.) Network monitoring

2 Answers  


How does Hold-downs work?

0 Answers  


Cisco routers can secure the enable password with a one-way hash algorithm. What command would encrypt the enable password with the strong encryption method? A.) enable encrypt john B.) password john C.) enable secret john D.) enable password john E.) secret john F.) enable password 5 john

1 Answers  


Why is UDP lease favored when compared to TCP?

0 Answers  


Categories