in the ospf area network dr and bdr selection procedure occur
let there are 4 router in that n/w r1 have the higher priority
then r2 and r2 have higher priority then r3 and so on
like that
r1>r2>r3>r4
now as we know that selection of dr and bdr based upon the
router priority so in this case r1 will be dr and r2 will be
bdr
now my question is that if i am going to implement 5th
router which have greater priority then r1 then will it become dr atomically
remember that i am not going change my 5 or 1st router property
answer that one please
Answers were Sorted based on User's Feedback
Answer / shivali
no, r5 will not be dr automatically....... it will become dr only if both dr & bdr goes down...
as whn dr goes down the bdr r2 will become dr. & r5 wll become bdr.after dat whn r2 goes dwn r5 will become dr...
so to make r5 to act as dr. we need disable & thn enable both r1 & r2
Is This Answer Correct ? | 6 Yes | 0 No |
Answer / k
Yes ..restart OSPF process ( Clear ip ospf process )or
Reload , R5 will become DR
Is This Answer Correct ? | 0 Yes | 1 No |
Hi Jitendera, Wat do u do..?? I mean r u working anywhere???? Basically where r u from??? If u don't hv any problem, u can say..?? Or else mail me mr.shahin07@gmail.com
Identify 3 methods used to prevent routing loops? A.) Split horizon B.) Holddown timers C.) Poison reverse D.) SPF algorithm E.) LSP's
Identify the order of the 5 step encapsulation? 1. Create the segment 2. Convert the frame to bits 3. Create the packet 4. Create the frame 5. User creates the data A.) 1,2,4,2,5 B.) 2,1,3,4,5 C.) 5,1,3,4,2 D.) 5,3,4,1,2
In port based access-list which command u give instead of ip?
To monitor IP igrp traffic, you can use "debug IP igrp transaction" or "debug IP igrp events". How do you display information about IPX routing update packets? A. debug routing B. debug ipx transaction C. debug ipx routing activity D. debug ipx events
As the system administrator, you type "ppp authentication chap pap secret". Which authentication method is used first in setting up a session? A. secret B. PAP C. CHAP D. PPP/SLIP
You want to segment a network. The network is running SNA and Netbios. Which device should NOT be used to segment the network? A.) A store and forward switch. B.) A router. C.) A Catalyst 5000. D.) A cut-through switch. E.) A bridge.
What do the following statements in an extended access list accomplish? access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 21 access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 20 access-list 101 permit TCP 172.16.4.0 0.0.0.255 0.0.0.0 255.255.255.255 A. This will block ftp traffic. B. This will block http traffic. C. This will permit ftp traffic. D. This will permit tftp traffic.
What is cisco?
Station A is transmitting data to station B faster that station B can handle it. When station B's buffer fills up, it send out a message to station A to stop sending data. After B empties out its buffer, station B sends a message to station A to start sending data again. This is most directly an example of (pick the best answer only): A.) Poison Reverse B.) Connectionless protocol C.) Windowing D.) Connection oriented protocol E.) Flow Control F.) Split Horizon
6. Which device can create smaller networks and stop broadcast storms by default? A. Repeater B. Bridge C. Router D. Gateway
Hi all, suppose more than two network administrators are configure same router with different configuration through telnet at the same time.. then whose(admin's) configuration will use router for routing ?