Choose a topic to test your knowledge and improve your Routing skills
In ______, the router forwards the received packet through only one of its interfaces.
In _______, the router may forward the received packet through several of its interfaces.
Emulation of ________ through _______ is not efficient and may create long delays.
In unicast routing, each router in the domain has a table that defines a ______ path tree to possible destinations.
In multicast routing, each involved router needs to construct a ________ path tree for each group.
In the _______ tree approach, each router needs to have one shortest path tree for each group.
In the group-shared tree approach, _________ involved in multicasting.
Multicast link state routing uses the _______ tree approach.
The Multicast Open Shortest Path First (MOSPF) protocol is an extension of the OSPF protocol that uses multicast routing to create source-based trees. The protocol is based on _______ routing.
MOSPF is a _______ protocol.
______ broadcasts packets, but creates loops in the systems.
In RPF, a router forwards only the copy that has traveled the _______ path from the source to the router.
RPF eliminates the ________ in the flooding process.
RPF guarantees that each network receives only ____ of the multicast packet.
RPB creates a shortest path _______ tree from the source to each destination.
RPB guarantees that each destination receives _________ of the packet.
In ________, the multicast packet must reach only those networks that have active members for that particular group.
____ adds pruning and grafting to _______ to create a multicast shortest path tree that supports dynamic membership changes.
______ is an implementation of multicast distance vector routing. It is a source-based routing protocol, based on RIP.
DVMRP is a ________routing protocol, based on RIP.
Pruning and grafting are strategies used in _______.
A _______ message tells an upstream router to stop sending multicast messages for a specific group through a specific router.
A _______ message tells an upstream router to start sending multicast messages for a specific group through a specific router.
CBT is a ________ protocol that uses a core as the root of the tree.
PIM-DM is used in a _______ multicast environment, such as a LAN.
PIM-SM is used in a _______multicast environment such as a WAN.
In _______, a logical tunnel is established by encapsulating the multicast packet inside a unicast packet.
If routing information is automatically updated by routers when changes are made to the network configuration are called
If two or more routers are available in distributed routing, which route should be selected
Multi-path routing can be achieved in
Distance vector protocols are
Which function allows dumping of invalid packets for a specific network instead of forwarding ?
In source routing bridges each LAN has a unique ................. bit number.
In adaptive tree walk protocol we use .............. and ............ searching.
The routing algorithm within each network is .........
In link state routing, after the construction of link state packets new routes are computed using .......
Count-to-Infinity problem occurs in .............
In distance vector routing algorithm, each router maintains a separate routing table with the following entries.
Link state packets are built in ........
In which routing method do all the routers have a common database?
In distance vector routing algorithm, the routing tables are updated ............
Distance vector routing algorithm is implemented in Internet as ............
Which of the following routing algorithm takes into account the current network load.
In distance vector routing the delay metric is ........
In AODV routing algorithm for MANETs, the route is discovered at time
In multicast routing with spanning tree method, a network with n groups, each with an average of m members, for each group we require .........
To do multicast routing, each router computes a ..........
A well -defined groups that are numerically large in size but small compared to the network as a whole are used in .......
The processes that keep track of hosts whose home is in the area, but who currently visiting another area is ........
In ........ to send a multicast message a host sends it to the core, which then does the multicast along the spanning tree.