Difference between routed and routing protocols not
difference between protocol between those.
Answers were Sorted based on User's Feedback
1> #routers exhange the information of networks through
routing protocols
#by using routing protocol routers can find the best path
in a network.
Examples are:-RIP,EIGRP,OSPF,BGP.
2> #Routed protocol add the information of source and
destination address on the data.
Examples are:-IP,IPX,Apple Talk
| Is This Answer Correct ? | 6 Yes | 0 No |
Answer / santosh
Routed protocols are protocols used for communication purpose from one end to other .Routing protocols are protocols used for deciding routing tables.eg:
Routed: TCP, UDP
Routing:RIP,EIGRP etc
| Is This Answer Correct ? | 5 Yes | 2 No |
Answer / gandhi
Routed Protocol - Data packets Used to transport user data
through the internetwork. Protocols used to support data
traffic are called routed protocols;
examples of routed protocols are IP and IPv6.
Routing Protocol - Route update packets Used to update
neighboring routers about the networks connected to all
routers within the internetwork. Protocols that
send route update packets are called routing protocols;
examples of some common ones are RIP, RIPv2, EIGRP, and
OSPF. Route update
packets are used to help build and maintain routing tables
on each router.
| Is This Answer Correct ? | 1 Yes | 0 No |
What are the different types of VPN?
When we do default route?
You want to set the console password to ralph. What would be the first command you need to execute from global configuration mode? A.) line console 0 B.) enable password ralph C.) login password ralph D.) set password= ralph E.) password ralph F.) login Ralph
Which NetWare protocol works on layer 3--network layer--of the OSI model? A. IPX B. NCP C. SPX D. NetBIOS
What is difference between standard and extended access-list
17 Answers College School Exams Tests, HCL, Wipro,
Put the following steps of encapsulation into the correct order: 1) The data is broken into segments to be organized 2) Frames are converted to 1s and 0s to be put on the wire 3) Packets are converted into frames 4) Information that users enter is converted into data 5) The segments are changed to packets to be routed A.) 4, 1, 3, 2, 5 B.) 4, 5, 1, 3, 2 C.) 2, 3, 1, 4, 5 D.) 4, 1, 5, 3, 2
What does a Standard IP Access-list use as test criteria? A.) IP source address B.) IP source and destination address, protocol numbers and port numbers C.) IPX source and destination address D.) Source MAC address
What is the most common layer 2 device? A. Hub B. Bridge C. Switch D. Router
Which of the following are examples of the Session Layer? A.) IP B.) Netbios Names C.) NFS D.) Token Ring E.) SQL F.) TCP
Which OSI layer handles physical address, network topology? A.) Presentation B.) Physical C.) Transport D.) Application E.) Data-Link F.) Network
What is the role of the LLC sublayer?
When we use extended access-list?