When only a single route is available to a given network, we have no option but to
use it if we wish to deliver traffic to that network. In the case when there are
multiple routes, how should the routing protocol determine which one is "best"?
Convergence in RIP
Split horizon with Poison Reverse
In certain circumstances it is necessary (or preferred) to only listen to RIP messages and not
send them - usually this is selected
Count to Infinity
Whilst the implementation of split horizon with poisoned reverse will break routing
loops between neighbours, they will not prevent routing loops within a network.
When a physical loop exists within a network, a link failure may result i
Cisco Router IP Access Lists
An Access List is a sequential list of filters, each of which specify a matching
criteria and an associated action - the action either being permit or deny. As we
will see, the matching criteria can range from very simple to r
Editing Access Lists
There are a few things to be aware of when working with access lists. Firstly,
editing is difficult and removing a single filter from an access list can be
challenging. For example, the following may not achieve the result you intend:
Filtering on Interfaces
It is important to understand how and when access lists are processed when
applied to an interface. This has implications for both security and performance.
In most cases outbound filtering is more efficient than inbound filtering.
TCP is connection-oriented. An important abstraction in TCP is the idea that a connection
is defined by apair of connection endpoints. An endpoint is a pair of numbers (host, port).
For example, when machine redgum (220.127.116.11) is delive
A process is an instance of a program - that is one that has been loaded into memory and
is being run by the operating system. An instance of a program includes all of its memory
and hardware registers along with the current value of its program
Routing-by-Rumour: Gossip Time
Since RIPv1 is a distance vector based routing protocol, it periodically broadcasts a full copy
of its routing table to neighbouring routers. By default, RIP will send an update in the form of
an unsolicited RIP response mes
Initial versions of TCP implemented flow control via the use of the receiver's advertised
window (the Window field in the TCP header). This allows the receiver to govern the
number of segments received. However, this does not allow for