(Accenture)1. Write a distance vector algoritam
2. TCP/IP 3 way hand shake




Answers were Sorted based on User's Feedback



(Accenture)1. Write a distance vector algoritam 2. TCP/IP 3 way hand shake ..

Answer / dev kumar

Distance vector-based routing algorithms (also known as
Bellman-Ford algorithms) pass periodic copies of a routing
table from router to router.
When the topology in a distance vector protocol
internetwork changes, routing table updates must occur. As
with the network discovery process, topology change updates
proceed step-by-step from router to router.
When maintaining the routing information, inconsistencies
can occur if the internetwork’s slow convergence on a new
configuration causes incorrect routing entries.

Is This Answer Correct ?    9 Yes 3 No

(Accenture)1. Write a distance vector algoritam 2. TCP/IP 3 way hand shake ..

Answer / ba

Distance vector protocol uses the bellman-fort algorithm.
it has 6 steps

1.increments the materic of the incoming route in the
advertisement.(counts the hops values)
2.Compare the n/w address in routing updaate from the
neighbor to wt the router has in the routing table.
3.if the neighbor information is better. it places the new
update in routing table, and delete the old entry.
4.if neighbor's information is worse, it ignors that.
5.if the neighbor update same as in routing table it resets
the timer for entry in the routing table.
6. if the neighbor's information is different path to same
destination, it stores the route in the routing table.

in the distance RIP doesnt support the un-equal paths.

Is This Answer Correct ?    6 Yes 3 No

(Accenture)1. Write a distance vector algoritam 2. TCP/IP 3 way hand shake ..

Answer / amrendra kumar

1.distance vector protocol work on Bellman–Ford algorithm,

2. SYN,SYN-ACK,ACK

Is This Answer Correct ?    1 Yes 0 No



Post New Answer



More Networking Administration Interview Questions

Where does sys_unconfig reside ?

1 Answers  


Which layer of the OSI model provides synchronization between user tasks by placing checkpoints in the data stream?

1 Answers  


You have a Class C network. You have subnetted it into 6 subnets. How many hosts per subnet do you have ?

1 Answers  


Can a user without superuser previlege run "ifconfig hme0" ?

1 Answers  


A subnet mask is used to mask a portion of the IP address so that TCP/IP can distinguish the __ ID from the __ ID.

1 Answers  






What is the name of the unique identifier encoded in the NIC? a. MAC address b. IP address.

1 Answers  


Which option of the dhtadm command modifies an entry in the dhcptab table ?

1 Answers  


Can ATM allocate bandwidth on demand ? a. Yes b. NO c. Only if you are running LANE d. Only if you are running layer 3 switches

1 Answers  


You have the following Network ID: 192.115.103.64/27. What is the IP range for your network?

5 Answers  


Which file serves as the configuration file for sendmail ?

1 Answers  


you have internet connection but u rnot able to open ur webpages, ur system is pinging properly to dns server . so pls tell me where is problem ?

13 Answers  


what is dns? what is the use and advatages?

6 Answers   IBM, Benvia,






Categories
  • Networking Protocols Interview Questions Networking Protocols (465)
  • Networking Administration Interview Questions Networking Administration (888)
  • Networking Security Interview Questions Networking Security (160)
  • Networking General Interview Questions Networking General (264)
  • Networking AllOther Interview Questions Networking AllOther (429)