edited by
834 views

2 Answers

0 votes
0 votes

Ans C

Updates are performed periodically in a distance-vector protocol where all or part of a router's routing table is sent to all its neighbours that are configured to use the same distance-vector routing protocol

0 votes
0 votes

Distance vector routing protocol uses a routing algorithm in which routers periodically send routing updates to all neighbors by broadcasting their entire route tables.

Some characteristics of Distance vector routing

Periodic updates - at the end of a certain time period, updates will be transmitted.  

Neighbors -  routers sharing a common data link. A distance vector routing protocol sends its updates to neighboring routers and depends on them to pass the update information along to their neighbors. For this reason, distance vector routing is said to use hop-by-hop updates.

Broadcast Updates - When a router first becomes active on a network, how does it find other routers and how does it announce its own presence? Several methods are available. The simplest is to send the updates to the broadcast address (in the case of IP, 255.255.255.255). Neighboring routers speaking the same routing protocol will hear the broadcasts and take appropriate action. Hosts and other devices uninterested in the routing updates will simply drop the packets.

Full Routing Table Updates - Most distance vector routing protocols take the very simple approach of telling their neighbors everything they know by broadcasting their entire route table, with some exceptions that are covered in following sections. Neighbors receiving these updates glean the information they need and discard everything else.

Hence, the answer is 3) At regularly scheduled intervals. 

edited by

Related questions

0 votes
0 votes
1 answer
1
0 votes
0 votes
2 answers
2
gatecse asked Mar 2, 2018
294 views
A jam signal sent through a network meansThe network traffic is too congestedThere has been a data collisionIt is time to goThe printer's paper feeder is jammed
0 votes
0 votes
2 answers
3
gatecse asked Mar 2, 2018
281 views
Bit stuffing is used toPad insufficient informationDistinguish beginning and ending flags from informationConvert 8 bit words into 16 bit wordsFill a data turkey
0 votes
0 votes
1 answer
4
gatecse asked Mar 2, 2018
338 views
WPA2 is used for security in ______. Ethernet Bluetooth Wi-Fi None of the above