Jump to content
Sadikhov IT Certification forums

Abhishek Gupta

  • Content Count

  • Joined

  • Last visited

  • Days Won


Abhishek Gupta last won the day on February 16 2011

Abhishek Gupta had the most liked content!

Community Reputation

1 Neutral

About Abhishek Gupta

  • Rank
  • Birthday 11/28/1983

Contact Methods

  • MSN
  • Yahoo

Profile Information

  • Gender
  • Location
  • Interests
    Playing Cricket,
  1. Abhishek Gupta

    IP Multicast

    Thanks for sharing a wonderful document on Multicasting...
  2. Abhishek Gupta

    Difference between AS_SET and AS_SEQUENCE

    Thanks guys its very useful information....
  3. Abhishek Gupta

    Virtual Etherchannel

    Hi All, Is it possible to create a virtual etherchannel, if possible than how we can do this?
  4. Abhishek Gupta

    Adding new switch to a network

    Make configuration rev no of new switch to lower than existing switch than connect it to your lan segment.
  5. Abhishek Gupta

    Automatc Fail over

    I think Flotting route can help you......Otherwise use Route map .....
  6. Abhishek Gupta

    Stuck in Active (SIA) in EIGRP

  7. Abhishek Gupta

    Load Balancing in OSPF

    How does OSPF support load balancing? Does it support load balancing the unequal cost path links or not ?
  8. Abhishek Gupta

    EIGRP Query Scoping

    EIGRP is based on the concept of diffusing computations. When something changes in network topology, the routers that detect a loss of network prefix will send out EIGRP QUERY messages that propagate in circular waves similar to the ripples on water surface. Every queried router will in turn query its neighbors and so on, until all routers that knew about the prefix affected. After this, the expanding circle will start collapsing back with EIGRP REPLY messages. The maximum radius of that circle may be viewed as the query scope. From scalability standpoint, it is very important to know what conditions will limit the average query scope, as this directly impact the network stability. You may compare the “query scope” with the concept of flooding domain in OSPF or ISIS. However, in contrast with the link-state protocols, you are very flexible with chosing the query scope boundaries, which is a powerful feature of EIGRP. There are four conditions that affect query propagation. Almost all of them are based on the fact that query stops once the queried router cannot find the exact match for the requested subnet in its topology table. After this the router responds back that the network is unknown. Based on this behavior, the following will stop query from propagation 1) Network summarization. This could be considered as one of the most effective methods of query scoping. If router A sends a summary prefix to router B, then any query from A to B with regards to the subnets encompassed by the summary route will not find the exact match in B’s topology table. Thus queries are stopped on the routers that are one-hop from point of summarization. Given the fact that EIGRP allows for introducing summarization virtually everywhere you may easily partition your network into query domains. However, one important thing here – this requires well-planned hierarchical addressing, based on the Core-Edge model. Sending a default route to isolated stub domain could be considered an extreme case of summarization and is very effective. 2) Route filtering. You may filter EIGRP routes at any point using distribute-lists, route-maps etc. As soon as a route is filtered, the next-hop router will not learn it. When a query propagates to the next-hop, it will stop and return back. The use of route filtering is probably not as popular as route summarization, but could be used in some situations when you want to reduce the overall amount of queries but want to retain some routing information. In general, using proper route summarization should be enough. 3) Stub routers. This feature is different. Instead of “deflecting” queries, it simply signals the neighbors NOT to query the given router. This means the stub router could not be used as a transit path for any network. The stub router neighbors will not query it and thus stub feature prevents queries from even being generated. It is especially effective in “start” network designs, such as hub-and-spoke networks. 4) Different EIGRP AS numbers. EIGRP processes run independently from each other, and queries from one system don’t leak into another. However, if redistribution is configured between two processes a behavior similar to query leaking is observed. Consider that router R runs EIGRP processes for AS1 and AS2 with mutual redistribution configured between the two processes. Assuming that a query from AS1 reaches R and bounces back, R is supposed to remove the route from the routing table. This in effect will trigger route removal from AS2 topology table, as redistribution is configured. Immediately after this R will originate a query into AS2, as the prefix becomes active. The query will travel across AS2 per the normal query propagation rules and eventually R will learn all replies and become passive for the prefixes. It’s even possible for R to learn the path to the lost prefix via AS2 and re-inject it back into AS1 if the network topology permits that. As per the regular query propagation rules, you may use prefix summarization when redistributing routes to limit the query scope. The above described are four main things that may limit query scoping. If you are using different AS numbers for this purpose, make sure you configure route summarization when doing redistribution, as otherwise you may get the “leaked query” effect.
  9. Abhishek Gupta

    Diffrence Between RSTP and STP

    Can anyone tell me the difference between RSTP and STP. Abhishek
  10. Abhishek Gupta

    Stuck in Active (SIA) in EIGRP

    Dear All, Can Someone help me to understand Stuck in Active in EIGRP? Abhishek Gupta
  11. Abhishek Gupta

    RSTP Confusion

    3) Alternate port—A port that has an alternative path to the root, different than the path the root port takes. This path is less desirable than that of the root port. (An example of this is an access-layer switch with two uplink ports; one becomes the root port, and the other is an alternate port.) 4)Backup port—A port that provides a redundant (but less desirable) connection to a segment where another switch port already connects. If that common segment is lost, the switch might or might not have a path back to the root.