How convergence happen in ospf?
Answers were Sorted based on User's Feedback
Answer / jitendera
convergence-when ther is nay change in network the
convergence proccess ocuurs.
When a route table or routing database becomes too large
(causing delays in packet processing), Route summarization
and stub areas are options to improve performance. There
are two types of route summarization: inter-areas and
external. ABR [Area Border Routers] summarize stub routes
and ASBR [Autonomous System Boundary Routers] summarize
only external routes.
Let’s see how convergence is reached in a network that
includes stub and totally stub routers.
Another route summarization tool is to create stub areas
and totally stub/stubby Areas. ABRs create sub-networks.
The stub/totally stub areas only communicate to the ABR via
default route 0.0.0.0. This means the stub/totally stub
router does not have a route to the destination; it just
forwards packets to the ABR which will forward the packet
to the destination. However, Stub routers contain all route
tables, whereas a totally stub knows only the routes within
its area
Is This Answer Correct ? | 4 Yes | 0 No |
Answer / sonu singh
if any link fail in ospf network , it send link state
advertisement (LSA) packets with a sequence number to there
neighbor ,The neighbor check the failed link sequence
number with the sequence number of his link database, if
the advertised sequence number is high then the neighbor
sequence number , the neighbor update his database,,if low
it send his link related information to advertiser,,if
equal it simply discard the packet.......Through this way
convergence happen in ospf.....
Is This Answer Correct ? | 4 Yes | 0 No |
Answer / s.m.feroz ahmed
Hi,
OSPF is a routing protocol and OSPF stands for Open
Shortest Path First.It will open short path to communicate
with another system.
Is This Answer Correct ? | 0 Yes | 0 No |
there is three mode of vtp let there are three switch s1 in server mode s2 in transparent mede and s3 in clint mode then will that tranparnt mode going to effect the network if yes then how and if no then what it will do
Identify the command to display the IP host table? A.) show ip hostnames B.) show ip names C.) show hosts D.) show ip hosts
Can anybody tell me how to configure a cisco router?
3 router configured with RIP & Ripv2 rotuer 1- connected with router 2 having sr ip 10.0.1.2 routing : ripv2 router 2: connected with router 1 and router 3 having sr 0 ip 10.0.1.3 & sr 1 ip 11.0.1.2 routing :rip & ripv2 router 3: connected with router 2 having sr ip 11.0.1.3 routing: rip is there communication possible btween these networks ? if yes how
can we measure how much a host exact bandwidth using by a network cable which is communicating over the network? options: 1- via Router 2- Switch, 3- other device... if yes.. then how ( with every option)
Which statement is true regarding the user exec and privileged exec mode? A.) The '?' only works in Privileged exec B.) Privileged exec is a subset of the user exec mode C.) They both require the enable password D.) User exec is a subset of the privileged exec mode
What is the checksum?
Which protocol is used for booting diskless workstations? A.) IP B.) ARP C.) RARP D.) TCP E.) SNMP
hi shain can u send me some detail about bgp so that i can enhance my knowledge over bgp and can you also teach me about the process of suppernating. now what i am thinking that this could be last visit on that site overhere.so please mail that short of thing on my gmail id i am requesting to all of the visitor that please send theire doubt or question to my new gmail id which is jitendera.ccnainterview@gmail.com.i will try to solve it if i am capable to do it Wishing all of you for great future Jitendera kaumar sinha
What is the default switching method for the Cisco 5000 series? A.) Cut-through B.) Store-and-splice C.) Latency D.) Store-and-forward
What ISDN protocol specifies concepts, terminology, and services? A.) Q B.) S C.) I D.) E
Identify 3 characteristics regarding IP access-lists? A.) Can be configured as a standard access-list B.) Can be run from another router running IP C.) Can be configured as a named access-list D.) Are the same as IPX access-lists E.) Can be configured as an extended access-list