Homework 4 Chapter 4: How Do Switches and Routers Find Paths 1. Routers and bridges use the concept of metric or cost. 2. Discuss how routers and bridges use path determination. What are the differences? Routers evaluate the metric of an entire end-to-end route or path. Bridges take a more local forwarding view than do routers. 3. Routing Protocols provide information for forwarding the packets of a routed protocol. 4. List the Dynamic routing protocols. Routing Information Protocol (RIP) Interior Gateway Routing Protocol (IGRP) Enhanced Interior Gateway Routing Protocol (EIGRP) Intermediate System to Intermediate System (IS-IS) Border Gateway Protocol (BGP) 5. What does a router have to do before it forwards? Obtain information about potential routes Participate in exchanges for dynamic routing protocols Install the best of these routes in the RIB. Look up the destination address of incoming packets in the FIB. 6. Can a RIB apply filtering? Yes, it can – as an option 7. Define the Classic Route Lookup Criteria. The Classic Route Lookup Criteria consists of four parts: 1. Basic Match: The network address prefix is extracted from the packet. Any non-matching route is rejected. 2. Longest Match: If there are multiple routes that match the basic match, the route with the highest number of matching bits is selected. 3. Weak Type of Service: Although outdated, the TOS bit fields in the IP header are considered for packet prioritization. This does not affect the route selected. 4. Best metric: Routes are assigned metrics based on either administrative distance for distance vector routing protocols or factors such as hop count, bandwidth utilization, MTU, etc for link state protocols. The route with the best metric is chosen. The best metric is usually the lowest metric. 8. What is a default route? A default route is the route selected when there are no other matching routes in the routing table. If there is no default route set, a “Destination unreachable” ICMP message is returned. 9. What is the address of the default route? Address: 0.0.0.0 Mask: 0.0.0.0 Next Hop: Next Hop address here. In CIDR notation: 0.0.0.0/0. 10. Layer 3 addresses have two levels of hierarchy. What are they? Prefix and Host 11. Does a routing table cause problems because of the size? Why and what can you do? The size of a routing table can cause problems due to increased router CPU utilization as the table grows. Without a hierarchy, it is necessary to search every address table in the domain. Large routing tables also cause problems with slow convergence in routing protocols. Default routes and route summarization are two methods of controlling the size of routing tables. Default routes assume that an upstream router knows more about the desired path than it does and so it forwards packets bound for unknown addresses to the default route. 12. Draw and discuss a default routing scenario. Internet 10.1.0.0/16 c Lo Router / Firewall 192.168.1.0/24 al: 20 4.9 5.1 1 05 0.1 /30 ,R em ote :2 0 5 4.9 .11 0.1 06 /30 In this case, a combination router/firewall is asked to route packets between two private networks and the Internet. Setting aside the firewall functions and using static routing, the firewall would have three routes: 10.1.0.0 255.255.0.0 10.1.1.1 192.168.1.0 255.255.255.0 192.168.1.1 0.0.0.0 0.0.0.0 204.95.110.106 Any paths not found in the first two routes would be sent via the default route. Figure 1: Default routing scenario 13. How do routes get installed in the RIB? A route must pass through acceptance filters. The RIB is checked for duplicates and assuming none are found the route is inserted into the RIB. 14. What does administrative distance mean? What number takes on the higher priority? Administrative distance is the preference given to a route. Administrative distances are numbered from 0 – 255. 0 means that a route is directly connected or is referenced by interface. Static routes usually an administrative distance of 1. Different routing protocols have different metrics though they can be changed if necessary although doing so without very good reason is not recommended. 15. What must routes have to be considered for load sharing? Routes must have the same administrative distance and must have the same metric if placed in the RIB by a dynamic routing protocol. 16. List the factors used in computing metrics. Link bandwidth, link delay, Administrative preferences, link error rate, and link utilization. 17. What is a quasi-static route? Quasi-static routes are static routes with different administrative preferences that can be used for load-sharing. 18. Do quasi-static routes need to be configured? Quasi-static routes must be manually configured. 19. What can you do to administer your edge routers? 1. Try very hard to avoid duplicate static routes. 2. Automate the updating of your router configurations using configurations created from your user address assignment database and loaded via tftp. 3. Generate human readable reports for troubleshooting and address allocation justification. 20. Define Layer 2 Paths Layer 2 Paths specify where not to go to find a particular destination. Frames are forwarded over interfaces that are not blocked by the spanning tree algorithm. 21. What are Layer 2 Paths used for? Layer 2 paths use the spanning tree algorithm to block forwarding in such a manner as to prevent looping. 22. Discuss the Spanning Tree Algorithm and how priority in the bridges are determined. The Spanning Tree algorithm is initiated by setting all ports to blocking. As ports come on-line, they are transitioned from a blocking state to a Learning / Forwarding state and finally to a listening state. Priorities in bridges are determined by concatenating the priority number and bridge ID. This is compared among adjacent bridges and the lowest priority/bridge ID combination is given priority. The bridge with the highest overall priority is the root bridge. 23. How are routes discovered using VLANs and ELANs? There are no special path determination processes. VLANs and ELANs encapsulate a payload protocol and associate it with a VLAN identifier. 24. List the tunneling components. 1. Original payload information 2. Tunneling information 3. Delivery protocol 25. What is a trunk? A trunk is a path between switches or bridges that can differentiate between multiple VLANs on the same link. 26. What are the two kinds of VLAN trunking? 1. Tunneling method 2. VLAN tagging