Homework 4

advertisement
Homework 4
Chapter 4: How Do Switches and Routers Find Paths
1. Routers and bridges use the concept of metric or cost.
2. Discuss how routers and bridges use path determination. What are the
differences?
Routers evaluate the metric of an entire end-to-end route or path. Bridges take a
more local forwarding view than do routers.
3. Routing Protocols provide information for forwarding the packets of a routed
protocol.
4. List the Dynamic routing protocols.
Routing Information Protocol (RIP)
Interior Gateway Routing Protocol (IGRP)
Enhanced Interior Gateway Routing Protocol (EIGRP)
Intermediate System to Intermediate System (IS-IS)
Border Gateway Protocol (BGP)
5. What does a router have to do before it forwards?
Obtain information about potential routes
Participate in exchanges for dynamic routing protocols
Install the best of these routes in the RIB.
Look up the destination address of incoming packets in the FIB.
6. Can a RIB apply filtering?
Yes, it can – as an option
7. Define the Classic Route Lookup Criteria.
The Classic Route Lookup Criteria consists of four parts:
1. Basic Match: The network address prefix is extracted from the packet.
Any non-matching route is rejected.
2. Longest Match: If there are multiple routes that match the basic match,
the route with the highest number of matching bits is selected.
3. Weak Type of Service: Although outdated, the TOS bit fields in the IP
header are considered for packet prioritization. This does not affect the route
selected.
4. Best metric: Routes are assigned metrics based on either administrative
distance for distance vector routing protocols or factors such as hop count,
bandwidth utilization, MTU, etc for link state protocols. The route with the best
metric is chosen. The best metric is usually the lowest metric.
8. What is a default route?
A default route is the route selected when there are no other matching routes in
the routing table. If there is no default route set, a “Destination unreachable”
ICMP message is returned.
9. What is the address of the default route?
Address: 0.0.0.0 Mask: 0.0.0.0 Next Hop: Next Hop address here.
In CIDR notation: 0.0.0.0/0.
10. Layer 3 addresses have two levels of hierarchy. What are they?
Prefix and Host
11. Does a routing table cause problems because of the size? Why and what can you
do?
The size of a routing table can cause problems due to increased router CPU
utilization as the table grows. Without a hierarchy, it is necessary to search every
address table in the domain. Large routing tables also cause problems with slow
convergence in routing protocols.
Default routes and route summarization are two methods of controlling the size of
routing tables. Default routes assume that an upstream router knows more about
the desired path than it does and so it forwards packets bound for unknown
addresses to the default route.
12. Draw and discuss a default routing scenario.
Internet
10.1.0.0/16
c
Lo
Router / Firewall
192.168.1.0/24
al:
20
4.9
5.1
1
05
0.1
/30
,R
em
ote
:2
0
5
4.9
.11
0.1
06
/30
In this case, a combination router/firewall
is asked to route packets between two
private networks and the Internet. Setting
aside the firewall functions and using
static routing, the firewall would have
three routes:
10.1.0.0 255.255.0.0 10.1.1.1
192.168.1.0 255.255.255.0 192.168.1.1
0.0.0.0 0.0.0.0 204.95.110.106
Any paths not found in the first two routes
would be sent via the default route.
Figure 1: Default routing scenario
13. How do routes get installed in the RIB?
A route must pass through acceptance filters. The RIB is checked for duplicates
and assuming none are found the route is inserted into the RIB.
14. What does administrative distance mean? What number takes on the higher
priority?
Administrative distance is the preference given to a route. Administrative
distances are numbered from 0 – 255. 0 means that a route is directly connected
or is referenced by interface. Static routes usually an administrative distance of 1.
Different routing protocols have different metrics though they can be changed if
necessary although doing so without very good reason is not recommended.
15. What must routes have to be considered for load sharing?
Routes must have the same administrative distance and must have the same metric
if placed in the RIB by a dynamic routing protocol.
16. List the factors used in computing metrics.
Link bandwidth, link delay, Administrative preferences, link error rate, and link
utilization.
17. What is a quasi-static route?
Quasi-static routes are static routes with different administrative preferences that
can be used for load-sharing.
18. Do quasi-static routes need to be configured?
Quasi-static routes must be manually configured.
19. What can you do to administer your edge routers?
1. Try very hard to avoid duplicate static routes.
2. Automate the updating of your router configurations using configurations
created from your user address assignment database and loaded via tftp.
3. Generate human readable reports for troubleshooting and address allocation
justification.
20. Define Layer 2 Paths
Layer 2 Paths specify where not to go to find a particular destination. Frames are
forwarded over interfaces that are not blocked by the spanning tree algorithm.
21. What are Layer 2 Paths used for?
Layer 2 paths use the spanning tree algorithm to block forwarding in such a manner
as to prevent looping.
22. Discuss the Spanning Tree Algorithm and how priority in the bridges are
determined.
The Spanning Tree algorithm is initiated by setting all ports to blocking. As ports
come on-line, they are transitioned from a blocking state to a Learning /
Forwarding state and finally to a listening state. Priorities in bridges are
determined by concatenating the priority number and bridge ID. This is
compared among adjacent bridges and the lowest priority/bridge ID combination
is given priority. The bridge with the highest overall priority is the root bridge.
23. How are routes discovered using VLANs and ELANs?
There are no special path determination processes. VLANs and ELANs
encapsulate a payload protocol and associate it with a VLAN identifier.
24. List the tunneling components.
1. Original payload information
2. Tunneling information
3. Delivery protocol
25. What is a trunk?
A trunk is a path between switches or bridges that can differentiate between
multiple VLANs on the same link.
26. What are the two kinds of VLAN trunking?
1. Tunneling method
2. VLAN tagging
Download