Appendix D. Answers to Review Questions

Chapter 1

1

The five layers of the TCP/IP protocol suite are the following:

  • Physical layer

  • Data-link layer

  • Internet (or IP) layer

  • Host-to-host layer

  • Application layer

The physical layer contains the protocols of the physical medium.

The data link layer contains the protocols that control the physical layer: how the medium is accessed and shared, how devices on the medium are identified, and how data is framed before being transmitted on the medium.

The internet layer contains the protocols that define the logical grouping of data links into a network and the communication across that network.

The host-to-host layer contains the protocols that define and control the logical, end-to-end paths across the network.

The application layer corresponds to the OSI session, presentation, and application layers.

2

The most common IP version now in use is version 4.

3

Routers perform fragmentation when a packet is longer than the maximum packet length (Maximum Transmission Unit, or MTU) supported by a data link onto which the packet must be transmitted. The data within the packet will be broken into fragments, and each fragment will be encapsulated in its own packet. The receiver uses the Identifier and Fragment Offset fields and the MF bit of the Flags field to reassemble the fragments.

4

The Time to Live (TTL) field prevents “lost” packets from being passed endlessly through the IP network. The field contains an 8-bit integer that is set by the originator of the packet. Each router through which the packet passes will decrement the integer by one. If a router decrements the TTL to zero, it will discard the packet and send an ICMP “time exceeded” error message to the packet’s source address.

5

The first octet rule determines the class of an IP address as follows:

  • Class A: The first bit of the first octet is always 0.

  • Class B: The first two bits of the first octet are always 10.

  • Class C: The first three bits of the first octet are always 110.

  • Class D: The first four bits of the first octet are always 1110.

  • Class E: The first four bits of the first octet are always 1111.

6

The A, B, and C IP addresses are recognized in dotted decimal and binary as follows:

Class

Binary Range of First Octet

Decimal Range of First Octet

A

00000001–01111110

1–126

B

10000000–10111111

128–191

C

11000000–11011111

192–223

7

An IP address mask identifies the network part of an IP address. Each one in the 32-bit mask marks the corresponding bit in the IP address as a network bit. A zero in the mask marks the corresponding bit in the IP address as a host bit. A Boolean AND is performed in all 32 bits of the address and the mask; in the result, all network bits of the mask will be repeated, and all host bits will be changed to zero.

8

A subnet is a subgrouping of a class A, B, or C IP address. Without subnetting, the network part of a major class A, B, or C IP address can only identify a single data link. Subnetting uses some of the host bits of a major IP address as network bits, allowing the single major address to be “subdivided” into multiple network addresses.

9

A classful routing protocol has no way to differentiate between the all-zeros subnet and the major IP address, and between the all-ones subnet and the all-hosts, all-subnets broadcast address of the major IP address.

10

ARP, or Address Resolution Protocol, is a function that maps the IP addresses of interfaces on a data link to their corresponding MAC identifiers.

11

Proxy ARP is a function of an IP router. If the router hears an ARP request, and

  • The destination network or subnet is in the router’s routing table, and

  • The table indicates that the destination is reachable via a different router interface than the one on which the ARP request was received,

  • The router will respond to the ARP request with its own MAC address.

12

A redirect is an IP router function. If a device has sent a packet to the router and the router must forward the packet to a next-hop router on the same data link, the router will send a redirect to the originating device. The redirect will inform the device that it can reach the next-hop router directly.

13

TCP, or Transmission Control Protocol, provides a connection-oriented service over the connectionless internet layer. UDP, or User Datagram Service, provides a connectionless service.

14

Correct sequencing is accomplished with sequence numbers. Reliability is accomplished by using checksums, acknowledgments, timers, and retransmissions. Flow control is accomplished by windowing.

15

A MAC identifier is a fixed-length binary integer. If IP used MAC identifiers as the host part of the IP address, subnetting would not be possible because there would be no flexibility in using some of the host bits as network bits.

16

The only purpose of the UDP header is to add fields for the source and destination port numbers.

Chapter 2

1

IPv6 addresses are 128 bits in length.

2

IPv6 addresses are represented as eight 16-bit hexadecimal segments separated by colons.

3

The two rules for compacting IPv6 addresses are

  1. The leading zeroes in any 16-bit segment do not have to be written.

  2. Any single, continuous string of one or more 16-bit segments consisting of all zeroes can be represented with a double colon.

4

Using more than one double colon ambiguates the address; the exact length of each string of zeroes cannot be determined.

5

Both addresses are all zeros. ::/0 is the default address, whereas ::/128 is the unspecified address.

6

The part of a unicast IPv6 address that specifies the host is the Interface ID, and it is usually 64 bits in length.

7

The Subnet ID of the unicast IPv6 address is 16 bits long.

8

An IPv6 address beginning with FF80::/10 is a link-local address.

9

This is a global unicast address, identified by the first three bits of 001.

10

An anycast address is an address that represents a service rather than a device, and can therefore appear on more than one device.

11

A multicast address is an address that represents a group of devices rather than a single device.

12

The IPv6 header is 40 bytes in length.

13

The Flow Label field, by labeling individual flows (packets with the same source and destination address and the same source and destination ports) in the header, is intended to allow highly granular load balancing without having to pay a performance penalty from having to look into the packet payload.

14

The IPv6 Next Header field corresponds to the IPv4 Protocol Number field. It is named differently because the value of the field might specify a following protocol header or it might specify an IPv6 extension header.

15

The Hop Limit field corresponds to the IPv4 Time to Live (TTL) field. The name is changed because routers have never decremented the field according to transit time; rather, every transit router decrements the field by 1, marking a hop instead of a transit time.

16

The IPv6 Next Header field is like the IPv4 Protocol Number field in that it is an 8-bit field that can, if the next header is an upper-layer protocol header, specify the protocol number. But it is different from the Protocol Number field in that it can also specify, if the next header is an IPv6 extension header, that header’s type number.

17

Extension headers make the IPv6 header more efficient by being specialized to specific functions and only being included when the specific function is used.

18

The Next Header value of ICMPv6 (corresponding to a Protocol Number) is 58.

19

Aside from the use of the Fragment extension header, the significant difference of IPv6 fragmentation from IPv4 fragmentation is that IPv6 routers do not fragment packets. It is up to the originating host to either fragment packets or ensure that no packet it originates is too large.

20

The five ICMPv6 messages used by NDP are Router Solicitation (RS), Router Advertisement (RA), Neighbor Solicitation (NS), Neighbor Advertisement (NA), and Redirect.

21

The M flag, when set, tells hosts to use DHCPv6 to configure its address. The O flag tells hosts to used DHCPv6 to find other link parameters.

22

The Reachable Timer field specifies the time, in milliseconds, that a node should assume a neighbor is reachable after the node has confirmed reachability.

23

The Retransmit Timer field specifies the period, in milliseconds, that a node should wait between successive transmissions of an NS.

24

A Router Lifetime value of 0 in the RA indicates that the originating router should not be added to a host’s default router list.

25

The S flag, when set, indicates that the NA was sent in response to an NS. Two-way reachability is confirmed, and a neighbor address changed to Reachable state in the neighbor cache, only if the NA is in response to a solicitation; so the reception of an NA with the S bit cleared, indicating that it is unsolicited, does not change the state of a neighbor cache entry.

26

Stateful address autoconfiguration relies on DHCPv6 to allocate an address to the host. Stateless address autoconfiguration uses RAs to determine a prefix of larger scope than link-local, plus MAC-to-EUI64 conversion, to determine a host’s address.

27

MAC-to-EUI64 conversion inserts a value of 0xFFFE in the middle of a MAC address, then flips the U/L bit to 1, to create a 64-bit Interface ID from a 48-bit MAC address.

28

Duplicate address detection must never be performed on an anycast address.

29

The prefix FF02:0:0:0:0:1:FF00::/104 is used for solicited node multicast addresses. It is prepended to the last 24 bits of an address that is being solicited.

30

IPv6 uses the NDP function Neighbor Address Resolution instead of ARP, and a neighbor cache instead of an ARP cache.

31

A privacy address is one in which the Interface ID is randomly generated, and changed both at some regular period and whenever a host acquires a new prefix. It is used in conjunction with an autoconfigured public address to ensure anonymity of the host. The public address is used for reachability, but the private address is used as the source address of any packets the host originates.

32

An Incomplete state indicates that Neighbor Address Resolution for the entry is in progress.

33

A Probe state indicates that an NS has been sent to verify two-way reachability of a Stale entry, but a responding NA has not yet been received.

34

Neighbor Unreachability Detection verifies two-way reachability of a neighbor either by “hints” from an upper-layer protocol that has received an acknowledgment of a sent message, or by actively probing the neighbor with an NS.

Chapter 3

1

At a minimum, each entry of the routing table must include a destination address and the address of a next-hop router or an indication that the destination address is directly connected.

2

Variably subnetted means that the router knows of more than one subnet mask for subnets of the same major IP address.

3

Discontiguous subnets are two or more subnets of a major IP network address that are separated by a different major IP address.

4

show ip route is used to examine the routing table of a Cisco router.

5

The command show ipv6 route displays the IPv6 route table. Prefixes, prefix lengths, and the next-hop address or outgoing interface are displayed, as are the administrative distance and route metric.

6

The first bracketed number is the administrative distance of the routing protocol by which the route was learned. The second number is the metric of the route.

7

When a static route is configured to reference an exit interface instead of a next-hop address, the destination address will be entered into the routing table as directly connected.

8

A summary route is a single route entry that points to multiple subnets or major IP addresses. In the context of static routes, summary routes can reduce the number of static routes that must be configured.

9

An administrative distance is a rating of preference for a routing protocol or a static route. Every routing protocol and every static route has an administrative distance associated with it. When a router learns of a destination via more than one routing protocol or static route, it will use the route with the lowest administrative distance.

10

A floating static route is an alternative route to a destination. The administrative distance is set high enough that the floating static route is used only if a more-preferred route becomes unavailable.

11

Equal-cost load sharing distributes traffic equally among multiple paths with equal metrics. Unequal-cost load sharing distributes packets among multiple paths with different metrics. The traffic will be distributed inversely proportional to the cost of the routes.

12

If an inbound interface is configured for CEF, the packet will be switched with CEF, and CEF load balancing rules will apply: per destination or per packet for IPv4, depending upon the configuration, and per destination for IPv6. If CEF is not configured on the inbound interface, the outbound interface determines the switching mode, and thus the method of load sharing. If an outbound interface is fast switched, per destination load sharing is performed. If an interface is process switched, per packet load sharing is performed.

13

A recursive routing table lookup occurs when a router cannot acquire all the information it needs to forward a packet with a single routing table lookup. For example, the router may perform one lookup to find the route to a destination and then perform another lookup to find a route to the next-hop router of the first route.

Chapter 4

1

A routing protocol is a “language” that routers speak to each other to share information about network destinations.

2

At a minimum, a routing protocol should define procedures for

  • Passing reachability information about networks to other routers.

  • Receiving reachability information from other routers.

  • Determining optimal routes based on the reachability information it has and for recording this information in a route table.

  • Reacting to, compensating for, and advertising topology changes in a network.

3

A route metric, also called a route cost or a route distance, is used to determine the best path to a destination. Best is defined by the type of metric used.

4

Convergence time is the time a group of routers takes to complete the exchange of routing information.

5

Load balancing is the process of sending packets over multiple paths to the same destination. Four types of load balancing are

  • Equal cost, per packet.

  • Equal cost, per destination.

  • Unequal cost, per packet.

  • Unequal cost, per destination.

6

A distance vector protocol is a routing protocol in which each router calculates routes based on the routes of its neighbors and then passes its routes to other neighbors.

7

Several problems associated with distance vector protocols are

  • A susceptibility to incorrect routing information because of its dependence on neighbors for correct information.

  • Slow convergence.

  • Route loops.

  • Counting to infinity.

8

Neighbors are routers connected to the same data link.

9

Route invalidation timers delete routes from a route table if they exceed a certain age.

10

Simple split horizon does not send route information back to the source of the route information. Split horizon with poisoned reverse sends the information back to the source but sets the metric to unreachable.

11

Counting to infinity occurs when routes update a route over a loop; each router increases the metric of the route until the metric reaches infinity. The effects of counting to infinity are controlled by defining infinity as a fairly low metric so that infinity is reached fairly quickly and the route is declared unreachable.

12

Holddown timers help prevent routing loops. If a route is declared unreachable or if the metric increases beyond a certain threshold, a router will not accept any other information about that route until the holddown timer expires. This approach prevents the router from accepting possibly bad routing information while the network is reconverging.

13

A distance vector router sends its entire route table, but it only sends the table to directly connected neighbors. A link state router sends only information about its directly connected links, but it floods the information throughout the networking area. Distance vector protocols usually use a variant of the Bellman-Ford algorithm to calculate routes, and link state protocols usually use a variant of the Dijkstra algorithm to calculate routes.

14

A topological database holds the link state information originated by all routers in the link state routing domain.

15

Each router floods a link state information advertisement describing its links, the states of its links, and any neighboring routers connected to those links, throughout the networking area. All routers store all received copies of the link state advertisement in a link state database. Each router calculates a shortest path tree from the information in the topological database and enters routes in its routing tables based on the shortest path tree.

16

Sequence numbers help a router differentiate between multiple copies of the same link state advertisement and also prevent flooded link state advertisements from circulating endlessly throughout the network.

17

Aging prevents old, possibly obsolete, link state information from residing in a topological database or from being accepted by a router.

18

A router builds a shortest path tree by first adding itself as the root. Using the information in the topological database, the router creates a list of all of its directly connected neighbors. The lowest-cost link to a neighbor becomes a branch of the tree, and that router’s neighbors are added to the list. The list is checked for duplicate paths, and if they exist, the higher-cost paths are removed from the list. The lowest-cost router on the list is added to the tree, that router’s neighbors are added to the list, and the list is again checked for duplicate paths. This process continues until no routers remain on the list.

19

Within a routing domain, areas are subdomains. They make link state routing more efficient by limiting the size of the link state database of each router in the area.

20

Depending on the usage, an autonomous system can be defined as a network under a common administrative domain or a single routing domain.

21

An Interior Gateway Protocol is a routing protocol that routes within an autonomous system. An Exterior Gateway Protocol is a routing protocol that routes between autonomous systems.

Chapter 5

1

RIP uses UDP port 520.

2

RIP uses a hop count metric. An unreachable network is indicated by setting the hop count to 16, which RIP interprets as an infinite distance.

3

RIP sends periodic updates every 30 seconds minus a small random variable that prevents the updates of neighboring routers from becoming synchronized.

4

A route entry is marked as unreachable if six updates are missed.

5

The garbage collection timer, or flush timer, is set when a route is declared unreachable. When the timer expires, the route is flushed from the route table. This process allows an unreachable route to remain in the routing table long enough for neighbors to be notified of its status.

6

The random timer, whose range is one to five seconds, prevents a “storm” of triggered updates during a topology change.

7

A Request message asks a router for an update. A Response message is an update.

8

A Request message might either ask for a full update, or in some special cases, it might ask for specific routes.

9

A Response is sent when the update timer expires, or upon reception of a Request message.

10

RIP updates do not include the subnet mask of the destination address, so a RIP router depends on the subnet masks of its own interfaces to determine how an attached major network address is subnetted. If a router does not have an attachment to a particular major network address, it has no way to know how that major network is subnetted. Therefore, no subnets of a major network address can be advertised into another major network.

Chapter 6

1

The Route Tag field, the Subnet Mask field, and the Next Hop field are RIPv2 extensions that do not exist in RIPv1 messages. The basic format of the RIP message remains unchanged between the two versions; Version 2 merely uses fields that are unused in Version 1.

2

In addition to the functions that use the new fields, RIPv2 supports authentication and multicast updates.

3

RIPv2 uses the multicast address 224.0.0.9. Multicasting of routing messages is better than broadcasting because hosts and non-RIPv2 routers will ignore the multicast messages.

4

When another routing protocol uses the RIPv2 domain as a transit domain, the protocol external to RIPv2 can use the Route Tag field to communicate information to its peers on the other side of the RIPv2 domain.

5

The Next Hop field is used to inform other routers of a next-hop address on the same multiaccess network that is metrically closer to the destination than the originating router.

6

RIPv2 uses the same UDP port number as RIPv1, port number 520.

7

RIPng uses the UDP port number 521.

8

A classless routing protocol does not consider the major network address in its route lookups, but just looks for the longest match.

9

To support VLSM, a routing protocol must be able to include the subnet mask of each destination address in its updates.

10

The Cisco implementation of RIPv2 supports clear-text authentication and MD5 authentication. Only clear-text authentication is defined in RFC 2453.

Chapter 7

1

EIGRP is a distance vector protocol.

2

By default, EIGRP uses no more than 50 percent of the link’s bandwidth, based on the bandwidth configured on the router’s interface. This percentage can be changed with the command ip bandwidth-percent eigrp.

3

EIGRP and IGRP use the same formula to calculate their composite metrics, but EIGRP scales the metric by a factor of 256.

The four basic components of EIGRP are

  • The Protocol Dependent Modules

  • The Reliable Transport Protocol

  • The Neighbor Discovery and Recovery Module

  • The Diffusing Update Algorithm

4

Reliable delivery means EIGRP packets are guaranteed to be delivered, and they are delivered in order. RTP uses a reliable multicast, in which received packets are acknowledged, to guarantee delivery; sequence numbers are used to ensure that they are delivered in order.

5

Sequence numbers ensure that a router is receiving the most recent route entry.

6

EIGRP uses the multicast address 224.0.0.10.

7

The packet types used by EIGRP are

  • Hellos

  • Acknowledgments

  • Updates

  • Queries

  • Replies

  • SIA-Queries

  • SIA-Replies

8

The default EIGRP Hello interval is 5 seconds, except on some slow-speed (T1 and below) interfaces, where the default is 60 seconds.

9

The EIGRP default hold time is three times the Hello interval.

10

The neighbor table stores information about EIGRP-speaking neighbors; the topology table lists all known routes that have feasible successors.

11

The feasible distance to a destination is a router’s lowest calculated distance to the destination.

12

The feasibility condition is the rule by which feasible successors are chosen for a destination. The feasibility condition is satisfied if a neighbor’s advertised distance to a destination is lower than the receiving router’s feasible distance to the destination. In other words, a router’s neighbor meets the feasibility condition if the neighbor is metrically closer to the destination than the router. Another way to describe this is that the neighbor is “downstream” relative to the destination.

13

A feasible successor to a destination is a neighbor that satisfies the feasibility condition for that destination.

14

A successor to a destination is a feasible successor that is currently being used as the next hop to the destination.

15

A route is active on a particular router if the router has queried its neighbors for a feasible successor and has not yet received a reply from every queried neighbor. The route is passive when there are no outstanding queries.

16

A route becomes active when no feasible successor exists in its topology table.

17

An active route becomes passive when a reply has been received from every queried neighbor.

18

If a router does not receive a reply from a queried neighbor within the active time (three minutes, by default), the route is declared stuck-in-active. A response with an infinite metric is entered on the neighbor’s behalf to satisfy DUAL, and the neighbor is deleted from the neighbor table.

19

Subnetting is the practice of creating a group of subnet addresses from a single IP network address. Address aggregation is the practice of summarizing a group of network or subnet addresses with a single IP network address.

Chapter 8

1

From the perspective of an OSPF router, a neighbor is another OSPF router that is attached to one of the first router’s directly connected links.

2

An OSPF adjacency is a conceptual link to a neighbor over which LSAs can be sent.

3

The five OSPF packet types, and their purposes, are

  • Hellos, which are used to discover neighbors, and to establish and maintain adjacencies

  • Updates, which are used to send LSAs between neighbors

  • Database Description packets, which a router uses to describe its link state database to a neighbor during database synchronization

  • Link State Requests, which a router uses to request one or more LSAs from a neighbor’s link-state database

  • Link State Acknowledgments, used to ensure reliable delivery of LSAs

4

A router originates a link-state advertisement to describe one or more destinations. An OSPF Update packet transports LSAs from one neighbor to another. Although LSAs are flooded throughout an area or OSPF domain, Update packets never leave a data link.

5

The most common LSA types and their purposes are

  • Type 1 (Router LSAs) are originated by every router and describe the originating router, the router’s directly connected links and their states, and the router’s neighbors.

  • Type 2 (Network LSAs) are originated by Designated Routers on multiaccess links and describe the link and all attached neighbors.

  • Type 3 (Network Summary LSAs) are originated by Area Border Routers and describe inter-area destinations.

  • Type 4 LSAs (ASBR Summary LSAs) are originated by Area Border Routers to describe Autonomous System Boundary Routers outside the area.

  • Type 5 (AS External LSAs) are originated by Autonomous System Boundary Routers to describe destinations external to the OSPF domain.

  • Type 7 (NSSA External LSAs) are originated by Autonomous System Boundary Routers within not-so-stubby areas.

6

The link state database is where a router stores all the OSPF LSAs it knows of, including its own. Database synchronization is the process of ensuring that all routers within an area have identical link-state databases.

7

The default OSPF HelloInterval is 10 seconds.

8

The default RouterDeadInterval is four times the HelloInterval.

9

A Router ID is an address by which an OSPF router identifies itself. It is either the numerically highest IP address of all the router’s loopback interfaces, or if no loopback interfaces are configured, it is the numerically highest IP address of all the router’s LAN interfaces. It can also be manually configured.

10

An area is an OSPF sub-domain, within which all routers have an identical link-state database.

11

Area 0 is the backbone area. All other areas must send their inter-area traffic through the backbone.

12

MaxAge, one hour, is the age at which an LSA is considered to be obsolete.

13

The four OSPF router types are

  • Internal Routers, whose OSPF interfaces all belong to the same area

  • Backbone Routers, which are Internal Routers in Area 0

  • Area Border Routers, which have OSPF interfaces in more than one area

  • Autonomous System Boundary Routers, which advertise external routes into the OSPF domain

14

The four OSPF path types are

  • Intra-area paths

  • Inter-area paths

  • Type 1 external paths

  • Type 2 external paths

15

What are the five OSPF network types?

The five OSPF network types are

  • Point-to-point networks

  • Broadcast networks

  • Non-broadcast multiaccess (NBMA) networks

  • Point-to-multipoint networks

  • Virtual links

16

A Designated Router is a router that represents a multiaccess network, and the routers connected to the network, to the rest of the OSPF domain.

17

Cisco IOS calculates the outgoing cost of an interface as 108/BW, where BW is the configured bandwidth of the interface. 108 can be changed with the OSPF command auto-cost reference-bandwidth.

18

An area is partitioned if one or more of its routers cannot send a packet to the area’s other routers without sending the packet out of the area.

19

A virtual link is a tunnel that extends an OSPF backbone connection through a non-backbone area.

20

A stub area is an area into which no type 5 LSAs are flooded. A totally stubby area is an area into which no type 3, 4, or 5 LSAs are flooded, with the exception of type 3 LSAs to advertise a default route. Not-so-stubby areas are areas through which external destinations are advertised into the OSPF domain, but into which no type 5 LSAs are sent by the ABR.

21

OSPF network entries are entries in the route table, describing IP destinations. OSPF router entries are entries in a separate route table that record only routes to ABRs and ASBRs.

22

Type 2 authentication uses MD5 encryption, whereas type 1 authentication uses clear-text passwords.

23

The three fields in the LSA header that distinguish different LSAs are the Type, Advertising Router, and the Link State ID fields. The three fields in the LSA header that distinguish different instances of the same LSA are the Sequence Number, Age, and Checksum fields.

Chapter 9

1

OSPFv3 cannot support IPv4 at the time of this writing. To route both IPv4 and IPv6 with OSPF, you must run both OSPFv2 and OSPFv3.

2

Multiple instance per link means that there can be separate adjacencies among different routers all connected to the same broadcast link, so that different OSPFv3 routing domains can use the same shared link without interfering with or having knowledge of each other. The Instance ID field in the OSPFv3 header makes this possible.

3

OSPFv3 packets are authenticated using the built-in IPv6 authentication (by means of the IPv6 Authentication extension header). OSPFv3 does not have its own authentication mechanism as OSPFv2 does.

4

The OSPFv3 Next Header number is the same as the OSPFv2 Protocol Number, 89.

5

OSPFv3 uses the reserved multicast addresses FF02::5 (AllSPFRouters) and FF02::6 (AllDRouters).

6

No. OSPFv3 uses the same five message types as OSPFv2.

7

The first bit is the U bit, specifying how the receiving router should treat the LSA if its type is unknown. The second and third bits are the S bits, indicating the flooding scope of the LSA.

8

OSPFv3 supports a link-local flooding scope that is not supported by OSPFv2. The Link LSA uses this flooding scope.

9

OSPFv3 Router and Network LSAs do not advertise prefixes, as OSPFv2 Router and Network LSAs do.

10

The Intra-Area Prefix LSA carries IPv6 prefixes connected to the originating router.

11

The Link LSA carries information that is only significant between two directly connected neighbors.

Chapter 10

1

An Intermediate System is the ISO term for a router.

2

A Network Protocol Data Unit is the ISO term for a packet.

3

An L1 router has no direct connections to another area. An L2 router has no adjacencies with L1 routers. An L1/L2 router routes both inter-area and intra-area traffic and acts as an inter-area gateway for L1 routers.

4

Cisco routers by default are L1/L2.

5

The borders of IS-IS areas are between routers, on links. The borders of OSPF areas are defined by the routers themselves.

6

Two L1/L2 routers with the same AIDs will form both an L1 and an L2 adjacency. Two L1/L2 routers with different AIDs will form an L2 adjacency.

7

Two L2-only routers will form an L2 adjacency, whether the AIDs are the same or different.

8

The Network Entity Title is an address by which a router identifies both itself and the area in which it resides.

9

The NSAP Selector should be set to 0x00 in a NET.

10

The System ID uniquely identifies a router within an IS-IS domain.

11

The portion of the NET preceding the last seven octets is the area address.

12

IS-IS does not elect a BDR.

13

The Pseudonode ID is the last octet of a LAN ID. Its purpose is to distinguish LAN IDs that are originated by a single router that is the DR on multiple LANs.

14

The MaxAge of an IS-IS LSP is 1200 seconds (20 minutes). The MaxAge (or beginning Remaining Lifetime) can be configured up to 65,535 seconds.

15

OSPF increments the age up to MaxAge; IS-IS decrements the age down to 0. A new OSPF LSA has an age of 0, whereas a new IS-IS LSP has an age of MaxAge.

16

The refresh rate of an IS-IS router is 900 seconds (15 minutes).

17

A Complete Sequence Number Packet contains a full listing of all LSPs in a database. A CSNP is periodically sent by the Designated Router on a broadcast network to maintain database synchronization.

18

A Partial Sequence Number Packet contains a listing of one or more LSPs. It has two uses: On point-to-point networks, it is used to acknowledge the receipt of LSPs. On broadcast networks, it is used to request LSPs.

19

An IS-IS router uses the Overload bit to inform its neighbors that it is experiencing a memory overload and cannot store the entire link-state database.

20

The Attached bit is used by L1/L2 routers to inform L1 routers that it is attached to the L2 backbone.

21

The Up/down bit is used to distinguish between an address that originated within an area, or an address that was leaked into an area.

22

The ISO specifies four metrics: Default, Expense, Delay, and Error. Cisco supports only the Default metric.

23

The two metric styles are narrow and wide. The narrow metric has a maximum value of 63. The wide metric has a maximum value of 16777214.

24

The maximum metric value of an IS-IS route is 1023 for narrow metrics and 4261412864 for wide metrics.

25

L1 IS-IS metrics apply to intra-area routes, and L2 IS-IS metrics apply to inter-area routes.

26

Internal metrics apply to routes to destinations within the IS-IS domain. External metrics apply to routes to destinations external to the IS-IS domain.

27

A single adjacency is formed between two routers, even if both IPv4 and IPv6 are configured in multi-topology mode.

28

L1 areas may be configured on a router. One L2 area is configured.

29

The two active mesh group modes are Blocked and Set (Numbered). Blocked mode offers the most reduced flooding, but at the possible cost of the most reduced redundancy and increased convergence time. Set mode, or numbered mesh groups, do not reduce flooding load as much as Blocked mode, but also have less potential impact on redundancy and convergence time.

Chapter 11

1

Routes that are learned from another routing protocol, between two processes of the same routing protocol, from static routes, or from a direct connection to the destination network can be redistributed into a routing domain. Routes can also be redistributed between IS-IS levels 1 and 2.

2

In contrast to metrics, which are used to determine the best path among multiple routes to the same destination discovered by the same routing protocol, administrative distances are used to determine the best path among multiple routes to the same destination discovered by different routing protocols.

3

A route to a destination within a routing domain with a higher administrative distance can be redistributed into a routing domain with a lower administrative distance. If that route is redistributed back into the higher-distance domain, packets might be misrouted into the lower-distance domain.

4

Redistributing variably subnetted destination addresses from a classless domain into a classful domain can cause problems. The classful domain might not be able to recognize all the subnets attempting to be redistributed from the classless domain.

5

OSPF and IS-IS understand the default metric. RIP, IGRP, and EIGRP do not.

6

The metric command assigns a metric to specific redistribution statements. The default-metric command assigns a metric to all redistribution commands that do not include the metric command.

7

Without the subnets keyword, only major network addresses that are not directly connected to the router will be redistributed.

8

A router that originates a summary route should use the null interface as the next hop of the summary route. Any packets that match the summary route, but for which there is no more-specific route to the packet’s destination address, will be dropped. This prevents the router from forwarding “lost” packets.

Chapter 12

1

The IPv4 default route address is 0.0.0.0.

2

The IPv6 default prefix/prefix length is ::/0.

3

EIGRP advertises a default address as an external address type.

4

Yes.

5

A stub router is a router with only a single link to another router. A stub network is a network with only one attached router.

6

Using a default route rather than a full route table can conserve router memory by keeping the table small and can save router processing cycles by limiting the routing information that must be processed.

7

Using a full route table rather than a default route can make routing more accurate.

8

ODR uses Cisco Discovery Protocol (CDP) to discover routes.

9

ODR is available in IOS 11.2 and later.

10

The medium over which ODR is to run must support SNAP.

Chapter 14

1

Route maps are similar to access lists in that they define match criteria and an action to take in the event of a match. Route maps are different from access lists in that they not only specify match criteria but also specify set criteria. The set action can modify a route, or route a packet according to the parameters of the packet.

2

Policy routes are static routes that use route maps to determine which packets should be routed and where the packets should be routed.

3

Route tags are fields within routing information packets that allow external information to be carried through the routing domain.

4

Route tags have no effect on the routing protocols that carry them.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset