Prelabs 1.) mtu <64-18000> (size in bytes) 2.) The router sends an ARP request to the destination host, if there is an ARP reply then the host is available. If not, continue to forward according to routing table. 3.) Routers. 4.) 30 hops which is the same default used for TCP connections. 5.) The role of the default gateway is to provide the next-hop IP address and interface for all destinations that are not located on its subnet. Without a default gateway, communication with remote destination is not possible unless additional routes are added to the IP routing table. 6.) 192.110.50.0 7.) Network IP address is the (host ip && subnet mask), and the network prefix is the first N bits of (host ip && subnet mask), where N is given by xxx.xxx.xxx.xxx/N. 8.) 1092 networks. The maximum number of hosts for the whole network number is 2^(32-16) = 2^16 = 65536. And there needs to be 60 hosts on each network so you divide 65536/60 = 1092. Prelab 4 1.) The command that configures a Linux PC as an IP router is: echo "1" > /proc/sys/net/ipv4/ip_forward 2.) The main differences between a distance vector routing protocol and a link state routing protocol are: --link-state algorithms send small updates everywhere, while distance vector algorithms send larger updates only to neighboring routers. --Because they converge more quickly, link-state algorithms are somewhat less prone to routing loops than distance vector algorithms. --link-state algorithms require more CPU power and memory than distance vector algorithms. --Link-state protocols are generally more scalable than distance vector protocols. 3.) The differences between an intradomain routing protocol (interior gateway protocol IGP) and in interdomain routing protocol (exterior gateway protocol EGP) are: --Intradomain Routing Protocols work only within domains. --Interdomian Routing Protocols work within and between domains. An example of an intradomain protocol is RIP and OSPF. An example of an interdomain protocol is BGP. 4.) Zebra supports RIP, GDP, and OSPF routing protocols. 5.) The process zebra updates the routing tables and exchanges routes between different routing protocols. 6.) The user starts zebra and then the specific routing protocol using for example ‘zebra start’ and then ‘ripd start’. Then he or she telnets into the localhost on the 2602 port using this command ‘telnet localhost 2602’ and then logs in and it emulates a real router OS such as the Cisco IOS. 7.) RIP 2 enabled RIP messages to carry more information, which permitted the use of a simple authentication mechanism to secure table updates. More importantly, RIP 2 supported subnet masks, a critical feature that was not available in RIP. 8.) Passive mode means that the host receives and processes incoming routing messages but does not transmit routing messages. Active routers advertise their routes (reachability information) to others; passive routers listen and update their routes based on advertisements but do not advertise (flood). Typically, routers run RIP in active mode, while hosts use passive mode. 9.) When the RIP sends routing-update when the network topology changes. When a router receives a routing update that includes changes to an entry, it updates its routing table to reflect the new route. After updating its routing table, the router immediately begins transmitting routing updates to inform other network routers of the change. These updates are sent independently of the regularly scheduled updates that RIP routers send. These independently sent updates are called triggered updates. 10.) Split-horizon is a mechanism that prevents incorrect routing information from being propagated. The split horizon rule prohibits a router from advertising a route through an interface that the router itself is using to reach the destination. In other words, its routing technique prevents information from exiting the router interface from which that information was received. Split-horizon updates are useful in preventing routing loops. In general, split horizon with poisoned reverse is safer than simple split horizon. If two gateways have routes pointing at each other, advertising reverse routes with a metric of 16 will break the loop immediately. If the reverse routes are simply not advertised, the erroneous routes will have to be eliminated by waiting for a timeout. However, poisoned reverse does have a disadvantage: it increases the size of the routing messages. 11.) Network areas usually are connected to other network areas via routers, making up a single autonomous system. An autonomous system is a collection of networks under a common administration sharing a common routing strategy. Autonomous systems are subdivided by areas. In other words, an autonomous systerm (AS) is a collection of IP networks under control of a single entity, typically an Internet Serivce Provider or a very large organization with redundant connections to the rest of the internet. A unique AS number is allocated to each AS for use in BGP routing. numbers are assigned by the same authorities that allocate IP addresses. AS, Stub AS, and Transit AS. 12.) UCI’s AS # is Number 2. NACS.uci.edu has AS Number 1. The Types of AS are Multihomed 13.) A Stub AS is only connected to one other AS. For routing purposes, it could be regarded as a simple extension of the other AS. In fact, most networks with a single Internet connection don't have a unique AS number assigned, and their network addresses are treated as part of the parent AS. A Transit AS has connections to more than one other AS and allows itself to be used as a conduit for traffic (transit traffic) between other AS's. Most large Internet Service Providers are transit AS's. A Multihomed AS has connections to more than one other AS, but does not allow transit traffic to pass, though its interior hosts may route traffic through multiple AS's. This is the typical configuration for a large corporate network with multiple redundant Internet connections, but which does not wish to pass traffic for others. Prelab 6 1. Routers - Each host's IP address must be configured. If network is reconfigured, IP addresses may need to be reassigned. Routing done via RIP or OSPF. Each router manipulates packet header. Routers operate on the network layer. Bridges - MAC addresses are hardwired. No network configuration needed. No routing protocol needed, but learning bridge and spanning tree algorithm. Bridges do not manipulate frames. Bridges operate on the data link layer. 2. When a hub receives a packet (chunk) of data (a frame in Ethernet lingo) at one of its ports from a PC on the network, it transmits (repeats) the packet to all of its ports and, thus, to all of the other PCs on the network. If two or more PCs on the network try to send packets at the same time a collision is said to occur. When that happens all of the PCs have to go though a routine to resolve the conflict. The process is proscribed in the Ethernet Carrier Sense Multiple Access with Collision Detection (CSMA/CD) protocol. An Ethernet switch automatically divides the network into multiple segments, acts as a high-speed, selective bridge between the segments, and supports simultaneous connections of multiple pairs of computers which don't compete with other pairs of computers for network bandwidth. accomplishes this by maintaining a table of each destination address and its port. It When the switch receives a packet, it reads the destination address from the header information in the packet, establishes a temporary connection between the source and destination ports, sends the packet on its way, and then terminates the connection. 3. In Transparent Bridging, end stations are totally unaware that a bridge interconnects the two LAN segments, and it is invisible to the operation of the LAN. Transparent bridges perform no protocol translation (such as from Ethernet to FDDI, or to Token Ring), and they do not calculate paths through the network to any end node. Bridges make their forwarding decisions based on the data link layer's MAC address. Transparent bridging also employs learning to associate MAC addresses with ports. 4. The role of the Spanning Tree Protocol is to prevent loops in the topology. How it works is as follows: One bridge, called the root bridge is elected to be the root of the tree. Each bridge determines which of its ports has the best path to the root bridge. On each LAN, the bridges elect one bridge, called the designated bridge, which, among all bridges on the same LAN, has the best path to the root bridge. Then, all bridges disable all ports that are not root ports or designated ports. What results is a spanning tree of bridges. Since a tree topology does not have a loop, forwarding along these routes guarantees that loops are entirely avoided. 5. a. Root bridge - A bridge that is elected as the root of the tree, where all data is forwarded to. b. Root port - the port on a bridge where data will move closest to the root bridge. c. Designated bridge - On each LAN, the bridges elect a designated bridge, which has the best path to the root bridge. d. Designated port - The port that connects a bridge to the LAN where it is a designated bridge. e. Blocked port - A disabled port on a bridge, because it is not a root port or a designated port. 6. A port on a bridge is disabled if it is not a root port or a designated port.