|
There are three big questions in this interview:
1. How to prevent the emergence of secondary path in Isis?
2. How to check packet loss?
3. In multicast protocol, what is the multicast protocol that can find multicast source? How is it realized?
Question:
1. In addition to the penetration of routing, what else can be done to solve the sub optimal path in Isis?
2. In layer 2, there are 10 different VLANs at the same time. The other 9 VLANs are normal, and the remaining one is not working. How can I check?
3. Explain the working mode of layer 2 interface of hybrid type?
4. What happens when the same router ID appears in OSPF? Explain in detail!
5. How to check the packet loss in the application layer?
|
|