(Accenture)1. Write a distance vector algoritam
2. TCP/IP 3 way hand shake

Answers were Sorted based on User's Feedback

(Accenture)1. Write a distance vector algoritam 2. TCP/IP 3 way hand shake ..

Answer / dev kumar

Distance vector-based routing algorithms (also known as
Bellman-Ford algorithms) pass periodic copies of a routing
table from router to router.
When the topology in a distance vector protocol
internetwork changes, routing table updates must occur. As
with the network discovery process, topology change updates
proceed step-by-step from router to router.
When maintaining the routing information, inconsistencies
can occur if the internetwork’s slow convergence on a new
configuration causes incorrect routing entries.

Is This Answer Correct ?    9 Yes 3 No

(Accenture)1. Write a distance vector algoritam 2. TCP/IP 3 way hand shake ..

Answer / ba

Distance vector protocol uses the bellman-fort algorithm.
it has 6 steps

1.increments the materic of the incoming route in the
advertisement.(counts the hops values)
2.Compare the n/w address in routing updaate from the
neighbor to wt the router has in the routing table.
3.if the neighbor information is better. it places the new
update in routing table, and delete the old entry.
4.if neighbor's information is worse, it ignors that.
5.if the neighbor update same as in routing table it resets
the timer for entry in the routing table.
6. if the neighbor's information is different path to same
destination, it stores the route in the routing table.

in the distance RIP doesnt support the un-equal paths.

Is This Answer Correct ?    6 Yes 3 No

(Accenture)1. Write a distance vector algoritam 2. TCP/IP 3 way hand shake ..

Answer / amrendra kumar

1.distance vector protocol work on Bellman–Ford algorithm,


Is This Answer Correct ?    1 Yes 0 No

Post New Answer

More Networking Administration Interview Questions

What is a collection of networks and routers under a single administrative control.

1 Answers  

Which command causes in.named to take a snapshot of its in-memory cached data.

1 Answers  

What is the behavior of the L2 Switch in case of receiving a multicast packet.

0 Answers   HCL,

Which command balnks out the routing table ?

1 Answers  

You have class B network with a 12 bit subnet. How many subnets and how many hosts per subnet are available ? a. 14, 14 b. 14, 4094 c. 4096, 14 d. 4094, 16 e. 4094, 14

1 Answers  

How a switch will identify that it has received a STP packet

0 Answers   HCL,

udp means

9 Answers   CTS, CSC,

How to set Proxy Setting?

6 Answers   TCS,

Which command would you use to kill a process by name ?

1 Answers  

Describe what a VPN is and how it works?

10 Answers  

What?s the default CDP holdtime in seconds for Cisco routers? * 30 seconds * 180 seconds * 90 seconds * 60 seconds

15 Answers   IBM, Cisco,

How dynamic host configuration protocol aid in network administration?

0 Answers  

  • Networking Protocols Interview Questions Networking Protocols (671)
  • Networking Administration Interview Questions Networking Administration (1008)
  • Networking Security Interview Questions Networking Security (194)
  • Networking General Interview Questions Networking General (266)
  • Networking AllOther Interview Questions Networking AllOther (430)