CCIE SP Written Flashcards
ISIS LFA FRR?
Pre-computed Backup route.
ISIS LFA FRR when there is a primary path link failure?
The backup routes (repair paths) are precomputed and installed
Can ISIS LFA FRR be more than one hop away? For what purpose?
Yes. Commonly used in ring topology.
What other protocol needs to be supported in order to run ISIS LFA FRR?
MPLS-TE
ISIS LFA FRR IOS restrictions?
- TE tunnel interface not protected
- IPv4 multicast supported.
- IS-IS LFA calculations restricted to same level or area.
- Only physical interfaces and physical port-channel interfaces protected.
What is the LFA?
Alternate node other than primary neighbor.
What algorithm is used to compute per prefix LFA’s?
The general algorithms found in RFC 5286
Why does ISIS examine LFA prefixes after SPF is performed for each neighbor?
IS-IS retains the best repair path .
Can a primary path have multiple LFAs?
Yes, but requires routing protocol
What are the attributes used for tie-breaking in ISIS LFA FRR?
- Downstream
- Linecard-disjoint—
- Shared Risk Link Group (SRLG)
- Load-sharing
- Lowest-repair-path-metric
- Node protecting
- Primary-path
- Secondary-path
How is ISIS LFA FRR configured in IOS?
isis [area-tag] fast-reroute remote-lfa {level-1 | level-2 } mpls-ldp [maximum-metric metric-value]
How is ISIS LFA FRR configured in IOS-XR?
interface Bundle-Ether bundle-id
address-family {ipv4 | ipv6}
fast-reroute per-prefix
What are some differences between SONET and SDH?
SONET - USA and Canada, SDH is used everywhere else.
SONET header (IP or Ethernet) may be interleaved into the payload at layer 1. Pattern is repeated until entire packet is sent.
What is lais?
Line Alarm Indication Signal (If SLOF or SLOS, set at remote end)
Low level alarm used in SONET/SDH used for failure detection
What is pais?
Path Alarm Indication Signal (Defect noticed on peer signal; minor)
Low level alarm used in SONET/SDH used for failure detection -
What is prdi?
Path Remote Defect Indication (issue with a node two sites away)
Low level alarm used in SONET/SDH used for failure detection -
What is slof?
Section loss of frame (errors in the framing pattern/alignment)
What is slos?
Section loss of signal (0->1 or 1->0 bit transitions not seen
Can SONET keepalives be mismatched between pairs?
Yes. Timers can be mismatched, one side can have it enabled, the other can have it disabled.
POS interface default CRC?
Extra resiliency?
16/32
What is APS for SONET and what is it used for?
Automatic Protection Switching - Allows for a pair of SONET links to serve as active/standby.
The working (W) link is backed up by the protect (P) link failover time is about 50ms.
For SONET APS, can the links be in different APS groups? How do the routers communicate APS information?
No, must be in the same group. The routers use Protect group protocol (PGP) to send APS info.
What exists over SONET/SDH for OAM functionality?
A Data Communications Channel (DCC). Can also be used for remote provisioning.
List all the SONET OC levels/Frame formats/SDH level and frame formats/and Line Rate
OC-1/STS-1 (810 bytes)/STM-0/51.84Mbps
OC-3/STS-3/STM-1/155.52Mbps
OC-12/STS-12/STM-4/622.08Mbps
OC-24/STS-24/N/A/1.244Gbps
OC-48/STS-48/STM-16/2.488Gbps
OC-192/STS-192/STM-64/9.953.28Gbps
OC-768/STS-768/STM-256/39.813Gbps
What is the frame format for an OC? How many are in an OC-3?
STS-1. 3 STS-1s.
What is LTE?
Long Term Evolution architecture consists of many various components that make up Mobility
Under mobility, what is UE? What is an example?
User Equipment. End-user device like a cellphone.
What does each UE contain? What is another name for it? What does it do?
Universal Integrated Circuit Card (UICC).
Under LTE context, known as Subscriber Identity Module (SIM). Identifies a phone’s number, billing plan, and all other network-related information.
What is eNodeB?
eNB, are base stations that control the mobile nodes in one or more calls.
What is a serving eNB?
A base station that is supporting a specific mobile node.
How many base stations can LTE mobile nodes communicate with?
one.
What is UMTS?
Universal Mobile Telecommunications System.
3G network that 4G LTE was built on. Was a combination of packet and circuit switched architectures.
What is E-UTRAN?
Evolved UMTS Terrestrial RAN.
Encompasses entire LTE architecture.
What services does E-UTRAN cover?
- Mobility control
- Radio admission control
- eNB configuration and provisioning
- dynamic resource allocation (Scheduling)
Is E-UTRAN packet or circuit switched?
Designed to be Packet switched, all IP network.
What are the upload and download rates of E-UTRAN?
Download - 299.6 Mbps, Upload - 75.4 Mbps.
What are the standardized E-UTRAN cell widths?
1.4 MHz, 3, 5, 10, 15, and 20 MHz
What is EPC?
Evolved Packet Core - responsible for forwarding traffic, handover events, filtering, billing and accounting.
Within EPC, what is HSS?
Home subscriber service - A central database that contains info about all the subscribers within a given network
What is PDN?
Packet Data Network - Any external network outside of LTE, like the internet.
What is P-GW?
PDN gateway -
What is MAM?
Maximum Allocation Model - support enforcement of Bandwidth Constraints
Describe traffic types in Diffserv-TE
- regular traffic
- constraint-based routing of “guaranteed” traffic
which satisfies a more restrictive bandwidth constraint than that satisfied by CBR
What is the regular regular TE tunnel bandwidth called?
Regular traffic or Bc0
What is the more restrictive or “guaranteed” traffic pool called?
The more restrictive bandwidth is termed a sub-pool or Bc1
Why is the sub-pool important?
- more restrictive bandwidth constraint
- higher Quality of Service performance in terms of delay, jitter, or loss for the guaranteed traffic.
What are the two models of allocating constrained bandwidth? What do they achieve?
MAM and RDM. Bandwidth efficiency, isolation across Class Types, and Protects against QoS degradation.
When would you use MAM?
When there is a need to ensure isolation across all Class Types without having to use pre-emption
can afford to risk some QoS degradation of Class Types other than the Premium Class.
When would you use RDM?
Prevent QoS degradation of all Class Types and can impose pre-emption.
What are the benefits of DiffServ-aware Traffic Engineering?
- Separate admission control and separate route computation for discrete subsets of traffic (for example, voice and data traffic).
- Develop QoS services for end customers based on signaled rather than provisioned QoS
- Build the higher-revenue generating “strict-commitment” QoS services, without over-provisioning
- Offer virtual IP leased-line, Layer 2 service emulation, and point-to-point guaranteed bandwidth services including voice-trunking
- Enjoy the scalability properties offered by MPLS.
What is DS-Lite?
The Dual Stack Lite (DS-Lite) feature enables legacy IPv4 hosts and server communication over both IPv4 and IPv6 networks.
Also, IPv4 hosts may need to access IPv4 internet over an IPv6 access network. The IPv4 hosts will have private addresses which need to have network address translation (NAT) completed before reaching the IPv4 internet.
What are two components of the Dual Stack Lite application?
- Basic Bridging BroadBand Element (B4):
- Address Family Transition Router(AFTR):
How does the DS-Lite feature help?
- Tunnelling IPv4 packets from CE devices over IPv6 tunnels to the ISM blade.
- Decapsulating the IPv4 packet and sending the decapsulated content to the IPv4 internet after completing network address translation.
What is GPON?
Ethernet or passive optical network (PON) technologies
GPON is a point-to-multi point access mechanism.
What are the primary features and benefits of GPON?
● Single fiber transceiver with single-mode SC receptacle
● Complies with ITU-T G.984.2 class B+ and C+
● Digital Optical Monitoring (DOM) support
● Complies with RoHS6 directive
● Point-to-multipoint
● Broadcast protocol uses TDMA
● High port density OLT at headend
● Low-cost ONT/ONU at home
● Primary market: FTTH for voice/data/video
● Low-cost passive optical splitter enables sharing of fiber, headend equipment
What protocol does RSVP-TE ride over?
IP Protocol 46
What label distribution method does RSVP use?
Downstream on demand
What is downstream on demand?
Downstream device doesn’t provide Label mapping until requested by an Upstream device
What is downstream unsolicited?
In this mode an LSR does not wait for a request from an upstream device before signaling FEC-to-label bindings. As soon as the LSR learns a route, it sends a binding for that route to all peer LSRs, both upstream and downstream. One disadvantage of this is that it doesn’t help in conserving labels as LSR receives label mappings from neighbors that may not be the next hop for the destination. This mode is used by BGP-LU and LDP.
What label control mode does RSVP use?
ordered control
What is ordered control?
n this approach, an LSR doesn’t advertise a FEC unless it’s the egress LSR for that FEC or until it has received a label for the FEC from its downstream peer. For each FEC for which the LSR is not the egress and no mapping exists, the LSR MUST wait until a label from a downstream LSR is received before mapping the FEC and passing corresponding labels to upstream LSRs. This is used by RSVP, LDP (JunOS) and BGP-LU.
What is Independent control?
This means that the LSR sending the label acts independently of its downstream peer. It does not wait for a label from the downstream LSR before it sends a label to its peers. This mode has the potential of blackholing the traffic. For instance, when operating in independent Downstream on Demand mode, an LSR may answer requests for label mappings immediately, without waiting for a label mapping from the next hop. This mode is used by LDP (IOS/IOS-XR)
What label retention mode does RSVP use?
Conservative Retention Mode
What is conservative retention mode?
In this mode LSR store only labels from a neighbor who is currently next hop for a FEC. The advantage is that it requires less memory
What is liberal retention mode?
In this mode LSR store all the labels received by the neighbors. One dis-advantage of this mode is that it requires more memory to store all the labels but provides faster convergence.
What is BFD?
Bidirectional Forwarding Detection (BFD) is a lightweight keepalive protocol design to reduce dead peer detection time across layer 2 networks. It is used primarily on networks that do not rely on line-protocol for interface status (like Ethernet).
What does BFD use for transport?
UDP, BFD uses echo messages to test reachability between neighbors and control messages for signaling.
Can other protocols register to BFD?
Yes, EIGRP, OSPFv2/3, IS-IS, BGP, RSVP-TE, PIM, and xconnect
Does BFD do neighbor detection?
NO. BFD does not perform neighbor detection; it relies on the registered protocol to do that, then runs probes based on those discovered IPv4/v6 neighbor addresses.
What is VRF lite?
Segment networks without MPLS.
Multiple routing tables that are completely separate from each other.
What is the purpose of a BGP confederation?
To achieve a full mesh of iBGP peering.
What is a route-reflector?
Routing information exchange server for all other iBGP routers.
What are the 4 message types used in BGP?
OPEN
UPDATE
NOTIFICATION
KEEPALIVE
Describe the BGP open message
Negotiate session capabilities
Contains:
BGP ver number
ASN of originating router
Hold time
BGP identifier
optional parameters
Describe the BGP update message
Advertises any feasible routes, withdraws previously advertised routes.
Includes the NLRI that includes the prefix and associated BGP PAs when advertising prefixes.
Withdrawn NLRIs include only the prefix.
An UPDATE message can act as a Keepalive to reduce unnecessary traffic.
Describe the BGP notification message
Sent when an error is detected with the BGP session, such as a hold timer expiring, neighbor capabilities change, or a BGP session reset is requested. This causes the BGP connection to close.
Describe the BGP keep alive message
Keepalive messages are exchanged every one-third of the Hold Timer agreed upon between the two BGP routers.
What is Kubernetes?
Kubernetes, or k8s (k, 8 characters, s…get it?), or “kube” if you’re into brevity, is an open source platform that automates Linux container operations.
How does kubernetes enhance linux container operations?
It eliminates many of the manual processes involved in deploying and scaling containerized applications.
Cluster together groups of hosts running Linux containers, and manage with Kubernetes.
What can the clusters span?
public, private and hybrid clouds
Why is Kube needed?
Real production apps span multiple containers. Those containers must be deployed across multiple server hosts. Kube is needed to manage containers.
What does Kube orchestration do?
Kubernetes orchestration allows you to build application services that span multiple containers, schedule those containers across a cluster, scale those containers, and manage the health of those containers over time.
What other services does Kube need to integrate with?
networking, storage, security, telemetry and other services to provide a comprehensive container infrastructure.
How does Kube help with container proliferation?
By sorting containers together into a ”pod.”
What is the primary advantage of using Kube?
Platform to schedule and run containers on clusters of physical or virtual machines.
What can you do with Kube?
- Orchestrate containers across multiple hosts. -Make better use of hardware to maximize resources needed to run your enterprise apps. -Control and automate application deployments and updates. -Mount and add storage to run stateful apps. -Scale containerized applications and their resources on the fly. -Declaratively manage services, which guarantees the deployed applications are always running how you deployed them. -Health-check and self-heal your apps with autoplacement, autorestart, autoreplication, and autoscaling.
What additional projects does Kube rely on?
Registry, through projects like Atomic Registry or Docker Registry. Networking, through projects like OpenvSwitch and intelligent edge routing. Telemetry, through projects such as heapster, kibana, hawkular, and elastic. Security, through projects like LDAP, SELinux, RBAC, and OAUTH with multi-tenancy layers. Automation, with the addition of Ansible playbooks for installation and cluster life-cycle management. Services, through a rich catalog of precreated content of popular app patterns.
What is the master container?
The machine that controls Kubernetes nodes. This is where all task assignments originate.
What is a node?
These machines perform the requested, assigned tasks. The Kubernetes master controls them.
What is a pod?
A group of one or more containers deployed to a single node.
What does Ansible do?
IT automation engine that automates cloud provisioning, configuration management, application deployment, intra-service orchestration, and many other IT needs.
How does Ansible work?
Ansible works by connecting to your nodes and pushing out small programs, called “Ansible modules” to them.
What does Ansible use?
YAML, in the form of Ansible Playbooks that allow you to describe your automation jobs in a way that approaches plain English.
Where is Ansible stored?
library of modules can reside on any machine, and there are no servers, daemons, or databases required.
Works with any terminal editor
What is a docker container?
A Docker container image is a lightweight, standalone, executable package of software that includes everything needed to run an application: code, runtime, system tools, system libraries and settings.
When does a container image become a container?
Container images become containers at runtime and in the case of Docker containers - images become containers when they run on Docker Engine.
Which docker containers run on docker engine?
-Standard: Docker created the industry standard for containers, so they could be portable anywhere
What does Openstack do?
OpenStack software controls large pools of compute, storage, and networking resources throughout a datacenter, managed through a dashboard or via the OpenStack API.
What is Openstack?
OpenStack is a cloud operating system that controls large pools of compute, storage, and networking resources throughout a datacenter, all managed through a dashboard that gives administrators control while empowering their users to provision resources through a web interface.
What is PBTS?
PBTS provides a mechanism that lets you direct traffic into specific TE tunnels based on different criteria.
What doe the mpls te tunnel priority values represent? What should higher bandwidth links have?
preferred (setup) and (hold) priority. Higher bandwidth links should have higher priority and will preempt.
What is TDM?
Time Division Multiplexing. a collection of 64 kbps channels, called DS0s, which are aggregated into a larger bundle to form T1/T3, E1/E3 specifications.
How much traffic does a DS0 carry?
8 bits every 125 us, which is 64 kbps.
How many DSOs in a T1?
24
What is the T1 line rate?
1.544 Mbps
How big is the T1 frame?
193 bits, 1 frame bit for OAM
What is the speed and bits for a T3?
44.736 Mbps with 28 DS1s + 69 frame bits
What is DWDM?
Dense WDM is an enhancement to the original WDM (coarse WDM) to stuff more wavelengths onto a single medium, which increases the bandwidth.
What is needed at each end of the DWDM link?
Multiplexer and de-multiplexer to combine and restore the signal
What is an OSC?
Optical Supervisor Channel can also be transmitted over the same optical medium to serve OAM purposes; it is analogous to SONET’s DCC.
What types of modulation are supported?
AM, FM, PSK, QAM, and others.
What is the major benefit of using DWDM?
It can expand optical capacity without having to lay more fiber as channel spacing between wavelengths becomes smaller.
What is DWDM most commonly used for?
commercial long-haul systems and often uses C-band frequencies.
What is DSL?
Digital Subscriber Line - widely deployed “last-mile” access technology passes digital data over telephone lines by using a different set of frequencies than are used to carry phone conversations.
What components comprise DSL?
A DSL connection is generally comprised of a DSL modem at the customer end and a DSL access multiplexer (DSLAM) at the provider end.
What does the DSLAM do?
The DSLAM aggregates many DSL connections and, using some kind of transport media like ATM or Ethernet, connects to the BRAS
What are the BGP Path attributes?
- Weight
- Local Preference
- Accumulated IGP (AIGP)
- Locally originated
- better than BGP learned
- AS-path length
- Origin
- MED Multi exit discriminator
- Neighbor type
- IGP metric to the next hop
- Tie breakers IGP cost-community Multipath For eBGP only, select the oldest route For iBGP or eBGP - Always compare RID For iBGP - select route with lowest cluster-list length Lowest Peer address
Describe Weight
Optional, local only. Higher is better, and locally originated prefixes are assigned a value of 32,768 by default.
Describe Local Preference
Mandatory, non-transitive. Higher is better with a default value of 100. Typically assigned inbound to an eBGP peer to affect traffic flows outbound. This attribute is maintained across confed-external boundaries.
Describe Accumulated IGP
Allows BGP to add the IGP metric to the BGP next-hop with the remote ASes metric value. Effectively, it is an end-to-end cost carried inside of BGP.
Describe Locally originated better than BGP learned
routes locally originated by a router (“sourced”) are preferred over any learned BGP routes.
Describe AS-path length
Mandatory, transitive, and well-known. The local AS is appended to an UPDATE message when routes are advertised out of an AS. AS path pre-pending is commonly set outbound to influence traffic flows inbound (opposite utility as local preference).
Describe Origin
Mandatory, transitive, and well-known. IGP implies the route was derived from IGP (network statement),
Describe Multi-exit discriminator (MED):
Optional, non-transitive. Used to carry the IGP metric to remote ASes to “hint” at the best path within the source AS network. Can be set outbound to influence flows inbound.
Describe Neighbor type
eBGP preferred over iBGP. Confed-external is treated the same as confed- internal, so this would be a tie in that case.
Describe IGP metric to the BGP next hop
Computed locally based on the recursive route lookups. Lower numbers are preferred
Describe the IP cost-community
Optional, non-transitive. If the IGP point of POI (which is the default) is passed in a prefix via extended communities, it is considered as the first “tie breaker”.
Describe Multipath
Multipath rules can be relaxed for iBGP unequal cost (where the IGP metric can be unequal), as well as the AS-path numbers.
Describe For eBGP only, select the oldest route:
This appears at the bottom of the route details when using the “show bgp afi safi x.x.x.x” command. The idea is to reduce churn in the eBGP topology by selecting the most stable route.
Describe For iBGP or eBGP with the “always compare RID”
Select the route coming from the lowest BGP RID.
Describe For iBGP, select the route with the lowest cluster-list length:
The idea is to pick the route that was reflected the fewest number of times.
Describe Lowest peer address:
This is the final tie-breaker it is the lowest peer address where the TCP session is established.
What are BGP pre-checks before best path attributes are compared?
- Next-hop reachability: Mandatory, well-known, and transitive. There must be a route to the BGP next-hop.
- iBGP synchronization: Often off by default, this rule states that for an iBGP route to be considered for best-path, there must be a matching IGP route in the routing table.
- Pre-bestpath cost-community: Optional, non-transitive.
What is SR?
Segment Routing - The idea is that individual nodes and adjacencies have segment IDs (SIDs), and each segment has label bindings.
What is SRGB?
(segment routing global block) s the range of label values reserved for Segment Routing and must not overlap with the global MPLS label range allocation.
What is GMPLS?
GMPLS is an extension of the MPLS. Given an all-optical network, traffic is often carried over these fibers in multiple different wavelengths. These different light waves are multiplexed (mux’ed) at the head-end and demultiplexed (demux’ed) at the tail end of the path.
Why use GMPLS?
Guarantee connectivity. GMPLS seeks to provide a mechanism to set up “light paths” from end to end based on a set of constraints.