CCIE SP Written Flashcards
ISIS LFA FRR?
Pre-computed Backup route.
ISIS LFA FRR when there is a primary path link failure?
The backup routes (repair paths) are precomputed and installed
Can ISIS LFA FRR be more than one hop away? For what purpose?
Yes. Commonly used in ring topology.
What other protocol needs to be supported in order to run ISIS LFA FRR?
MPLS-TE
ISIS LFA FRR IOS restrictions?
- TE tunnel interface not protected
- IPv4 multicast supported.
- IS-IS LFA calculations restricted to same level or area.
- Only physical interfaces and physical port-channel interfaces protected.
What is the LFA?
Alternate node other than primary neighbor.
What algorithm is used to compute per prefix LFA’s?
The general algorithms found in RFC 5286
Why does ISIS examine LFA prefixes after SPF is performed for each neighbor?
IS-IS retains the best repair path .
Can a primary path have multiple LFAs?
Yes, but requires routing protocol
What are the attributes used for tie-breaking in ISIS LFA FRR?
- Downstream
- Linecard-disjoint—
- Shared Risk Link Group (SRLG)
- Load-sharing
- Lowest-repair-path-metric
- Node protecting
- Primary-path
- Secondary-path
How is ISIS LFA FRR configured in IOS?
isis [area-tag] fast-reroute remote-lfa {level-1 | level-2 } mpls-ldp [maximum-metric metric-value]
How is ISIS LFA FRR configured in IOS-XR?
interface Bundle-Ether bundle-id
address-family {ipv4 | ipv6}
fast-reroute per-prefix
What are some differences between SONET and SDH?
SONET - USA and Canada, SDH is used everywhere else.
SONET header (IP or Ethernet) may be interleaved into the payload at layer 1. Pattern is repeated until entire packet is sent.
What is lais?
Line Alarm Indication Signal (If SLOF or SLOS, set at remote end)
Low level alarm used in SONET/SDH used for failure detection
What is pais?
Path Alarm Indication Signal (Defect noticed on peer signal; minor)
Low level alarm used in SONET/SDH used for failure detection -
What is prdi?
Path Remote Defect Indication (issue with a node two sites away)
Low level alarm used in SONET/SDH used for failure detection -
What is slof?
Section loss of frame (errors in the framing pattern/alignment)
What is slos?
Section loss of signal (0->1 or 1->0 bit transitions not seen
Can SONET keepalives be mismatched between pairs?
Yes. Timers can be mismatched, one side can have it enabled, the other can have it disabled.
POS interface default CRC?
Extra resiliency?
16/32
What is APS for SONET and what is it used for?
Automatic Protection Switching - Allows for a pair of SONET links to serve as active/standby.
The working (W) link is backed up by the protect (P) link failover time is about 50ms.
For SONET APS, can the links be in different APS groups? How do the routers communicate APS information?
No, must be in the same group. The routers use Protect group protocol (PGP) to send APS info.
What exists over SONET/SDH for OAM functionality?
A Data Communications Channel (DCC). Can also be used for remote provisioning.
List all the SONET OC levels/Frame formats/SDH level and frame formats/and Line Rate
OC-1/STS-1 (810 bytes)/STM-0/51.84Mbps
OC-3/STS-3/STM-1/155.52Mbps
OC-12/STS-12/STM-4/622.08Mbps
OC-24/STS-24/N/A/1.244Gbps
OC-48/STS-48/STM-16/2.488Gbps
OC-192/STS-192/STM-64/9.953.28Gbps
OC-768/STS-768/STM-256/39.813Gbps
What is the frame format for an OC? How many are in an OC-3?
STS-1. 3 STS-1s.
What is LTE?
Long Term Evolution architecture consists of many various components that make up Mobility
Under mobility, what is UE? What is an example?
User Equipment. End-user device like a cellphone.
What does each UE contain? What is another name for it? What does it do?
Universal Integrated Circuit Card (UICC).
Under LTE context, known as Subscriber Identity Module (SIM). Identifies a phone’s number, billing plan, and all other network-related information.
What is eNodeB?
eNB, are base stations that control the mobile nodes in one or more calls.
What is a serving eNB?
A base station that is supporting a specific mobile node.
How many base stations can LTE mobile nodes communicate with?
one.
What is UMTS?
Universal Mobile Telecommunications System.
3G network that 4G LTE was built on. Was a combination of packet and circuit switched architectures.
What is E-UTRAN?
Evolved UMTS Terrestrial RAN.
Encompasses entire LTE architecture.
What services does E-UTRAN cover?
- Mobility control
- Radio admission control
- eNB configuration and provisioning
- dynamic resource allocation (Scheduling)
Is E-UTRAN packet or circuit switched?
Designed to be Packet switched, all IP network.
What are the upload and download rates of E-UTRAN?
Download - 299.6 Mbps, Upload - 75.4 Mbps.
What are the standardized E-UTRAN cell widths?
1.4 MHz, 3, 5, 10, 15, and 20 MHz
What is EPC?
Evolved Packet Core - responsible for forwarding traffic, handover events, filtering, billing and accounting.
Within EPC, what is HSS?
Home subscriber service - A central database that contains info about all the subscribers within a given network
What is PDN?
Packet Data Network - Any external network outside of LTE, like the internet.
What is P-GW?
PDN gateway -
What is MAM?
Maximum Allocation Model - support enforcement of Bandwidth Constraints
Describe traffic types in Diffserv-TE
- regular traffic
- constraint-based routing of “guaranteed” traffic
which satisfies a more restrictive bandwidth constraint than that satisfied by CBR
What is the regular regular TE tunnel bandwidth called?
Regular traffic or Bc0
What is the more restrictive or “guaranteed” traffic pool called?
The more restrictive bandwidth is termed a sub-pool or Bc1
Why is the sub-pool important?
- more restrictive bandwidth constraint
- higher Quality of Service performance in terms of delay, jitter, or loss for the guaranteed traffic.
What are the two models of allocating constrained bandwidth? What do they achieve?
MAM and RDM. Bandwidth efficiency, isolation across Class Types, and Protects against QoS degradation.
When would you use MAM?
When there is a need to ensure isolation across all Class Types without having to use pre-emption
can afford to risk some QoS degradation of Class Types other than the Premium Class.
When would you use RDM?
Prevent QoS degradation of all Class Types and can impose pre-emption.
What are the benefits of DiffServ-aware Traffic Engineering?
- Separate admission control and separate route computation for discrete subsets of traffic (for example, voice and data traffic).
- Develop QoS services for end customers based on signaled rather than provisioned QoS
- Build the higher-revenue generating “strict-commitment” QoS services, without over-provisioning
- Offer virtual IP leased-line, Layer 2 service emulation, and point-to-point guaranteed bandwidth services including voice-trunking
- Enjoy the scalability properties offered by MPLS.
What is DS-Lite?
The Dual Stack Lite (DS-Lite) feature enables legacy IPv4 hosts and server communication over both IPv4 and IPv6 networks.
Also, IPv4 hosts may need to access IPv4 internet over an IPv6 access network. The IPv4 hosts will have private addresses which need to have network address translation (NAT) completed before reaching the IPv4 internet.
What are two components of the Dual Stack Lite application?
- Basic Bridging BroadBand Element (B4):
- Address Family Transition Router(AFTR):
How does the DS-Lite feature help?
- Tunnelling IPv4 packets from CE devices over IPv6 tunnels to the ISM blade.
- Decapsulating the IPv4 packet and sending the decapsulated content to the IPv4 internet after completing network address translation.
What is GPON?
Ethernet or passive optical network (PON) technologies
GPON is a point-to-multi point access mechanism.
What are the primary features and benefits of GPON?
● Single fiber transceiver with single-mode SC receptacle
● Complies with ITU-T G.984.2 class B+ and C+
● Digital Optical Monitoring (DOM) support
● Complies with RoHS6 directive
● Point-to-multipoint
● Broadcast protocol uses TDMA
● High port density OLT at headend
● Low-cost ONT/ONU at home
● Primary market: FTTH for voice/data/video
● Low-cost passive optical splitter enables sharing of fiber, headend equipment
What protocol does RSVP-TE ride over?
IP Protocol 46
What label distribution method does RSVP use?
Downstream on demand
What is downstream on demand?
Downstream device doesn’t provide Label mapping until requested by an Upstream device
What is downstream unsolicited?
In this mode an LSR does not wait for a request from an upstream device before signaling FEC-to-label bindings. As soon as the LSR learns a route, it sends a binding for that route to all peer LSRs, both upstream and downstream. One disadvantage of this is that it doesn’t help in conserving labels as LSR receives label mappings from neighbors that may not be the next hop for the destination. This mode is used by BGP-LU and LDP.
What label control mode does RSVP use?
ordered control
What is ordered control?
n this approach, an LSR doesn’t advertise a FEC unless it’s the egress LSR for that FEC or until it has received a label for the FEC from its downstream peer. For each FEC for which the LSR is not the egress and no mapping exists, the LSR MUST wait until a label from a downstream LSR is received before mapping the FEC and passing corresponding labels to upstream LSRs. This is used by RSVP, LDP (JunOS) and BGP-LU.
What is Independent control?
This means that the LSR sending the label acts independently of its downstream peer. It does not wait for a label from the downstream LSR before it sends a label to its peers. This mode has the potential of blackholing the traffic. For instance, when operating in independent Downstream on Demand mode, an LSR may answer requests for label mappings immediately, without waiting for a label mapping from the next hop. This mode is used by LDP (IOS/IOS-XR)
What label retention mode does RSVP use?
Conservative Retention Mode
What is conservative retention mode?
In this mode LSR store only labels from a neighbor who is currently next hop for a FEC. The advantage is that it requires less memory
What is liberal retention mode?
In this mode LSR store all the labels received by the neighbors. One dis-advantage of this mode is that it requires more memory to store all the labels but provides faster convergence.
What is BFD?
Bidirectional Forwarding Detection (BFD) is a lightweight keepalive protocol design to reduce dead peer detection time across layer 2 networks. It is used primarily on networks that do not rely on line-protocol for interface status (like Ethernet).
What does BFD use for transport?
UDP, BFD uses echo messages to test reachability between neighbors and control messages for signaling.
Can other protocols register to BFD?
Yes, EIGRP, OSPFv2/3, IS-IS, BGP, RSVP-TE, PIM, and xconnect
Does BFD do neighbor detection?
NO. BFD does not perform neighbor detection; it relies on the registered protocol to do that, then runs probes based on those discovered IPv4/v6 neighbor addresses.
What is VRF lite?
Segment networks without MPLS.
Multiple routing tables that are completely separate from each other.
What is the purpose of a BGP confederation?
To achieve a full mesh of iBGP peering.
What is a route-reflector?
Routing information exchange server for all other iBGP routers.
What are the 4 message types used in BGP?
OPEN
UPDATE
NOTIFICATION
KEEPALIVE
Describe the BGP open message
Negotiate session capabilities
Contains:
BGP ver number
ASN of originating router
Hold time
BGP identifier
optional parameters
Describe the BGP update message
Advertises any feasible routes, withdraws previously advertised routes.
Includes the NLRI that includes the prefix and associated BGP PAs when advertising prefixes.
Withdrawn NLRIs include only the prefix.
An UPDATE message can act as a Keepalive to reduce unnecessary traffic.
Describe the BGP notification message
Sent when an error is detected with the BGP session, such as a hold timer expiring, neighbor capabilities change, or a BGP session reset is requested. This causes the BGP connection to close.
Describe the BGP keep alive message
Keepalive messages are exchanged every one-third of the Hold Timer agreed upon between the two BGP routers.
What is Kubernetes?
Kubernetes, or k8s (k, 8 characters, s…get it?), or “kube” if you’re into brevity, is an open source platform that automates Linux container operations.
How does kubernetes enhance linux container operations?
It eliminates many of the manual processes involved in deploying and scaling containerized applications.
Cluster together groups of hosts running Linux containers, and manage with Kubernetes.
What can the clusters span?
public, private and hybrid clouds
Why is Kube needed?
Real production apps span multiple containers. Those containers must be deployed across multiple server hosts. Kube is needed to manage containers.
What does Kube orchestration do?
Kubernetes orchestration allows you to build application services that span multiple containers, schedule those containers across a cluster, scale those containers, and manage the health of those containers over time.
What other services does Kube need to integrate with?
networking, storage, security, telemetry and other services to provide a comprehensive container infrastructure.
How does Kube help with container proliferation?
By sorting containers together into a ”pod.”
What is the primary advantage of using Kube?
Platform to schedule and run containers on clusters of physical or virtual machines.
What can you do with Kube?
- Orchestrate containers across multiple hosts. -Make better use of hardware to maximize resources needed to run your enterprise apps. -Control and automate application deployments and updates. -Mount and add storage to run stateful apps. -Scale containerized applications and their resources on the fly. -Declaratively manage services, which guarantees the deployed applications are always running how you deployed them. -Health-check and self-heal your apps with autoplacement, autorestart, autoreplication, and autoscaling.
What additional projects does Kube rely on?
Registry, through projects like Atomic Registry or Docker Registry. Networking, through projects like OpenvSwitch and intelligent edge routing. Telemetry, through projects such as heapster, kibana, hawkular, and elastic. Security, through projects like LDAP, SELinux, RBAC, and OAUTH with multi-tenancy layers. Automation, with the addition of Ansible playbooks for installation and cluster life-cycle management. Services, through a rich catalog of precreated content of popular app patterns.
What is the master container?
The machine that controls Kubernetes nodes. This is where all task assignments originate.
What is a node?
These machines perform the requested, assigned tasks. The Kubernetes master controls them.
What is a pod?
A group of one or more containers deployed to a single node.
What does Ansible do?
IT automation engine that automates cloud provisioning, configuration management, application deployment, intra-service orchestration, and many other IT needs.
How does Ansible work?
Ansible works by connecting to your nodes and pushing out small programs, called “Ansible modules” to them.
What does Ansible use?
YAML, in the form of Ansible Playbooks that allow you to describe your automation jobs in a way that approaches plain English.
Where is Ansible stored?
library of modules can reside on any machine, and there are no servers, daemons, or databases required.
Works with any terminal editor
What is a docker container?
A Docker container image is a lightweight, standalone, executable package of software that includes everything needed to run an application: code, runtime, system tools, system libraries and settings.
When does a container image become a container?
Container images become containers at runtime and in the case of Docker containers - images become containers when they run on Docker Engine.
Which docker containers run on docker engine?
-Standard: Docker created the industry standard for containers, so they could be portable anywhere
What does Openstack do?
OpenStack software controls large pools of compute, storage, and networking resources throughout a datacenter, managed through a dashboard or via the OpenStack API.
What is Openstack?
OpenStack is a cloud operating system that controls large pools of compute, storage, and networking resources throughout a datacenter, all managed through a dashboard that gives administrators control while empowering their users to provision resources through a web interface.
What is PBTS?
PBTS provides a mechanism that lets you direct traffic into specific TE tunnels based on different criteria.
What doe the mpls te tunnel priority values represent? What should higher bandwidth links have?
preferred (setup) and (hold) priority. Higher bandwidth links should have higher priority and will preempt.
What is TDM?
Time Division Multiplexing. a collection of 64 kbps channels, called DS0s, which are aggregated into a larger bundle to form T1/T3, E1/E3 specifications.
How much traffic does a DS0 carry?
8 bits every 125 us, which is 64 kbps.
How many DSOs in a T1?
24
What is the T1 line rate?
1.544 Mbps
How big is the T1 frame?
193 bits, 1 frame bit for OAM
What is the speed and bits for a T3?
44.736 Mbps with 28 DS1s + 69 frame bits
What is DWDM?
Dense WDM is an enhancement to the original WDM (coarse WDM) to stuff more wavelengths onto a single medium, which increases the bandwidth.
What is needed at each end of the DWDM link?
Multiplexer and de-multiplexer to combine and restore the signal
What is an OSC?
Optical Supervisor Channel can also be transmitted over the same optical medium to serve OAM purposes; it is analogous to SONET’s DCC.
What types of modulation are supported?
AM, FM, PSK, QAM, and others.
What is the major benefit of using DWDM?
It can expand optical capacity without having to lay more fiber as channel spacing between wavelengths becomes smaller.
What is DWDM most commonly used for?
commercial long-haul systems and often uses C-band frequencies.
What is DSL?
Digital Subscriber Line - widely deployed “last-mile” access technology passes digital data over telephone lines by using a different set of frequencies than are used to carry phone conversations.
What components comprise DSL?
A DSL connection is generally comprised of a DSL modem at the customer end and a DSL access multiplexer (DSLAM) at the provider end.
What does the DSLAM do?
The DSLAM aggregates many DSL connections and, using some kind of transport media like ATM or Ethernet, connects to the BRAS
What are the BGP Path attributes?
- Weight
- Local Preference
- Accumulated IGP (AIGP)
- Locally originated
- better than BGP learned
- AS-path length
- Origin
- MED Multi exit discriminator
- Neighbor type
- IGP metric to the next hop
- Tie breakers IGP cost-community Multipath For eBGP only, select the oldest route For iBGP or eBGP - Always compare RID For iBGP - select route with lowest cluster-list length Lowest Peer address
Describe Weight
Optional, local only. Higher is better, and locally originated prefixes are assigned a value of 32,768 by default.
Describe Local Preference
Mandatory, non-transitive. Higher is better with a default value of 100. Typically assigned inbound to an eBGP peer to affect traffic flows outbound. This attribute is maintained across confed-external boundaries.
Describe Accumulated IGP
Allows BGP to add the IGP metric to the BGP next-hop with the remote ASes metric value. Effectively, it is an end-to-end cost carried inside of BGP.
Describe Locally originated better than BGP learned
routes locally originated by a router (“sourced”) are preferred over any learned BGP routes.
Describe AS-path length
Mandatory, transitive, and well-known. The local AS is appended to an UPDATE message when routes are advertised out of an AS. AS path pre-pending is commonly set outbound to influence traffic flows inbound (opposite utility as local preference).
Describe Origin
Mandatory, transitive, and well-known. IGP implies the route was derived from IGP (network statement),
Describe Multi-exit discriminator (MED):
Optional, non-transitive. Used to carry the IGP metric to remote ASes to “hint” at the best path within the source AS network. Can be set outbound to influence flows inbound.
Describe Neighbor type
eBGP preferred over iBGP. Confed-external is treated the same as confed- internal, so this would be a tie in that case.
Describe IGP metric to the BGP next hop
Computed locally based on the recursive route lookups. Lower numbers are preferred
Describe the IP cost-community
Optional, non-transitive. If the IGP point of POI (which is the default) is passed in a prefix via extended communities, it is considered as the first “tie breaker”.
Describe Multipath
Multipath rules can be relaxed for iBGP unequal cost (where the IGP metric can be unequal), as well as the AS-path numbers.
Describe For eBGP only, select the oldest route:
This appears at the bottom of the route details when using the “show bgp afi safi x.x.x.x” command. The idea is to reduce churn in the eBGP topology by selecting the most stable route.
Describe For iBGP or eBGP with the “always compare RID”
Select the route coming from the lowest BGP RID.
Describe For iBGP, select the route with the lowest cluster-list length:
The idea is to pick the route that was reflected the fewest number of times.
Describe Lowest peer address:
This is the final tie-breaker it is the lowest peer address where the TCP session is established.
What are BGP pre-checks before best path attributes are compared?
- Next-hop reachability: Mandatory, well-known, and transitive. There must be a route to the BGP next-hop.
- iBGP synchronization: Often off by default, this rule states that for an iBGP route to be considered for best-path, there must be a matching IGP route in the routing table.
- Pre-bestpath cost-community: Optional, non-transitive.
What is SR?
Segment Routing - The idea is that individual nodes and adjacencies have segment IDs (SIDs), and each segment has label bindings.
What is SRGB?
(segment routing global block) s the range of label values reserved for Segment Routing and must not overlap with the global MPLS label range allocation.
What is GMPLS?
GMPLS is an extension of the MPLS. Given an all-optical network, traffic is often carried over these fibers in multiple different wavelengths. These different light waves are multiplexed (mux’ed) at the head-end and demultiplexed (demux’ed) at the tail end of the path.
Why use GMPLS?
Guarantee connectivity. GMPLS seeks to provide a mechanism to set up “light paths” from end to end based on a set of constraints.
Does GMPLS support bi-directional LSPs?
Yes. If using this feature, the requirements for the LSP are the same in both directions, which reduces latency during setup time.
What is MPLS-TP?
MPLS TP is a mechanism to adjust typical MPLS behavior (technically IP/MPLS) to better emulate TDM networks.
Which features of IP/MPLS are not supported in MPLS-tp?
- PHP: MPLS-TP paths are statically configured and highly explicit,
- ECMP: MPLS-TP requires all paths to be congruent (symmetric)
- Label merge: When two LSPs reach a common LSR and have a common next-hop, their LSPs can be merged by using a single outgoing-label. This is not allowed in MPLS-TP since every LSP is entirely different, again, like a traditional circuit.
What benefits does MPLS-TP support over IP/MPLS?
- No need to configure IP:
- Advanced OAM: Rich set of tools to monitor and manage the MPLS-TP and the PWs that run through it. This includes the Generic Alert Label (GAL) and the Generic Associated Channel (G- ACH). In summary, this provides SONET/SDH-like features such as automatic protection switching (APS) and data communications channel (DCC).
- Fault reporting:
What is QinQ?
QinQ (dot1q tunneling or provider bridging) is a method of adding additional 802.1q headers to an Ethernet frame to tunnel it across different networks.
What is 802.1ad?
802.1ad is an amendment to 802.1q which allows them to be stacked in an Ethernet frame’s header.
What are the benefits to tag stacking?
- Adding an additional tag squares # of VLANs (2^24 = 16777216)
- Tags can be added (pushed), removed (popped), or changed (translated) by network devices as necessary.
- Provides the basis for provider bridging and provider backbone bridging (PBB)
What is the standard ethertype?
0x88A8 for the outer tag (service tag, carrier tag, metro tag, tag 1, or S- tag)
0x8100 for the inner tag (customer tag, tag 2, or C-tag).
What is 802.1ah MAC in MAC (Provider Backbone Bridges)?
B-MACs are service provider switch MACs that serve as the outer encapsulation for customer traffic. In this way, provider switches don’t need to learn all C-MACs, only B-MACs, of which there is one per PE.
What is REP?
REP is a Cisco-proprietary protocol that is used to rapidly converge a layer 2 Ethernet network arrayed in a ring topology.
Describe G.8032?
Also known as Ethernet Ring Protection Switching (ERPS). A segment is called a “ring” and an independent link between two ring nodes is called a “ring link”. The ports that run this protocol on ring links are called “ring ports”. The alternate (blocked) port is known as the ring protection link, or RPL. The node that is actually blocking a port is known as the “RPL owner node”.
How does G.032 use CFM?
ERPS registers to CFM as a client.
Describe QoS Link fragmentation (LFI)?
QoS link fragmentation and interleaving (LFI) is a common technique for slow WAN links to reduce latency for priority traffic.
Large data packets take longer to serialize over slow WAN links than small voice packets do.
What is serialization delay?
Delay (sec) = size (bits) / rate (bits/sec) - As an example, a 1500 byte packet (12000 bits) going over a T1 link (1544000 bps) will take about ~8ms (0.008 seconds) to serialize.
What is the slowest link that VoIP can use?
768 kbps (half T1) is the cutoff for a slow link.
What is SSO?
Stateful switchover. RSP/RP to be written to the backup one so that it can immediately take over if the primary one fails.
What is NSF?
Non-stop forwarding. During an SSO event, NSF ensures that despite a brief loss of the control plane due to an RSP/RP failure, traffic can still be forwarded.
What is NSR?
Maintains the routing protocol information during an SSO event. BGP sessions can remain intact. NSR is available with OSPFv2/v3, IS-IS, BGP, LDP routing technologies currently. RVSP-TE, EIGRP, and RIP are not included.
Does ISIS support NSR and NSF?
Yes. IS-IS supports both NSF and NSR. The NSF capability of IS-IS is signaled using the Restart TLV, which is carried in the hello PDUs
Does OSPFv2 support NSR and NSF?
Yes. NSF requires some extensions to OSPF so that the peer routers remain aware of the restarting router. OSPF uses new “grace LSAs”, which are link-local opaque LSAs containing the grace period time in their payloads.
What is NSF called in OSPFv3?
OSPFv3 calls NSF “graceful-restart”.
Describe BGP NSR and GR
BGP GR’s primary purpose is the same as the other protocols: don’t introduce churn into the protocol while a router switches over, specify a grace period, and continue forwarding as normal. BGP accomplishes this by introducing the End-of-RIB (EoR) marker, as well as a new “Graceful Restart” capability.
What is EoR?
Marks the end of RIB, it is effectively an explicit signal to the peer that the BGP UPDATE messages have ceased.
Does LDP support GR and NSF?
Yes. Although not a routing protocol, LDP is critical for most MPLS applications. It also has the concept of GR/NSF and NSR for this reason.
Does RSVP-TE support GR and NSF?
Just GR is used to maintain state information when a node in the LSP performs an RP switchover.
Does EIGRP support GR or NSF?
EIGRP supports GR/NSF but not NSR.
What is carrier delay?
A timer that runs in software to identify when a link goes down at layer 1. This is normally set to 2 seconds to prevent against very short flaps, which may introduce churn.
What is BGPsec?
A BGP prefix is cryptographically signed with the key of its valid originator, and each BGP router receiving the path checks to ensure the prefix originated from the valid owner.
Describe performance management and capacity procedures
Performance management: practice of managing network service response time, consistency, and quality for individual and overall services.
Capacity management: process of determining the network resources required to prevent a performance or availability impact on business-critical applications.
Describe backscatter traceback
Forwarding of ICMP unreachables back into the core network and ultimately into a sinkhole for analysis.
Describe lawful-intercept
This allows a mediation device to communicate to a router over SNMPv3 to setup/teardown wiretap sessions on a network device.
Describe BGP Flowspec
Defines additional BGP NLRI to inject traffic manipulation policy information to be dynamically implemented by a receiving router. It can signal specific QoS actions, redirect traffic into a VRF for analysis, or drop the traffic.
Describe DDoS mitigation techniques
ACLs, remotely triggered black holes, unicast RPF, backscatter traceback, and BGP Flowspec.
Describe network event and fault management
Functions that detect, isolate, and correct malfunctions in the network.
Describe performance management and capacity procedures Capacity management:
Performance management: practice of managing network service response time, consistency, and quality for individual and overall services.
process of determining the network resources required to prevent a performance or availability impact on business-critical applications.
Describe Queuing
The larger the queue, the longer data has to wait. Tail drop occurs when the queue is full and admittance is prohibited.
What are common areas for concern with capacity and performance?
a. CPU. Used by both control and data planes on any network device.
b. Backplane of I/O.
c. Memory and buffers.
d. Interface and pipe sizes.
e. Queuing, latency, and jitter.
f. Speed and distance.
g. Application characteristics. Small window sizes, application keepalives, and amount of data sent over the network versus what is required is often the reason for poor application performance.
What are network best practices?
a. Service level management - SLA
b. Network and application what-if analysis.
c. Baselining and trending.
d. Exception management.
e. QoS management.
What is NETCONF and YANG?
Network Configuration Protocol. It is a standard for configuring, deleting, and modifying configurations on network devices.
YANG is used to model the network configurations and state into tree structures; it is the data model for NETCONF.
what additional features does NETCONF have?
Test configurations before committing them, being able to configure multiple network devices concurrently, and bulk-get operations that are much faster than SNMP.
NETCONF uses SSH
NETCONF messages are encoded in XML, and individual YANG data models are included as “capabilities” in NETCONF hello packets. .
What are the benefits to YANG?
The structure contains several “types”, which include integers, Booleans, enumerations, pointers, and other information types to be processed.
What is BGP RT-filter unicast / IPv4 RT-filter feature?
If a PE is only importing a subset of RTs, the RR will reflect all VPN routes to a PE where the majority of them are rejected due to the RT-import not being locally configured for any VRF.
Why use AIGP?
Control flow of traffic.
What is cost-community / Point of Insertion?
Carry cost information around BGP networks.
What is BGP MVPN
Encompass all of the solutions meant to transport multicast traffic from place to place in a VPN environment.
What was the original multicast solution?
Draft-Rosen, used GRE tunnels to connect all of the PE devices in a given MVPN instance
Where is PIM applied
Customer and Core, P router just act as transit.
What is supported in Rosen-GRE?
PIM-ASM, PIM-SSM, or PIM-Bidir in the core.
What is the main issue with Profile 0?
It does not take advantage of MPLS transport.
Can RSVP be used with Multicast?
Yes. P2MP RSVP-TE, a multipoint tunnel can be built from headend to multiple tail ends, which is perfect for transporting one-way multicast.
Can LDP be used with Multicast?
Yes. multicast LDP (mLDP).
What is PMSI? and what does it do?
Provider Multicast Service Interface is a conceptual “overlay” on the P-network that refers to a “service”.
Packets are encapsulated in IP/GRE or MPLS and delivered to the PMSI where they are de-capsulated.
What is Type 1 PMSI?
Intra-AS Inclusive PMSI (I-PMSI) AD: Originated by each PE inside an AS; used to learn MVPN membership.
What is Type 2 PMSI?
Inter-AS I-PMSI AD: Originated by each ASBR; used to learn MVPN membership. This is examined in detail when testing inter-AS MVPN.
What is Type 3 PMSI?
Selective (S-PMSI) AD: Originated by the source (ingress) PE and used for signaling a specific P2MP tree or data MDT.
This is meant to selectively target receivers that want multicast for a given C(S,G).
What is Type 4 PMSI?
Leaf AD: If the Type-3 requests it, the receiver (Egress) PEs will explicitly show interest in a specific C(S,G).
What is Type 5 PMSI?
Source Active AD: Originated by the source (ingress) PE when it learns about an active source and assist with SPT switchover.
How do customers exchange PIM?
The method by which customers exchange multicast routing has always been PIM.
What is Type 6 PMSI?
Shared Tree Join: Specifies the RP and group, and is meant to signal C-PIM-ASM interest in a particular group. This replaces the PIM (*,G) signaling.
What is Type 7 PMSI?
Source Tree Join: Looks identical to a Type-6 except the RP’s IP address is substituted for the source’s address. It can also be sent upon receipt of a Type-5 Source Active AD message. This replaces the PIM (S,G) signaling.
How is C-Multicast carried outside of PIM/BGP?
mLDP is also capable of carrying the c-mcast signaling in-band.
How does a router decide on what P tunnel to use?
It needs to look at the I-PMSI or S-PMSI to determine the tunnel type. Each transport method has a different tunnel type.
Where is the I-PMSI and S-PMSI attributes carried?
Inside the PMSI attributes within BGP AD routes
How do tunnels encapsulate and decapsulate packets? Can there be a mismatch?
Type 0: No tunnel specified Type 1: RSVP-TE P2MP Type 2: mLDP P2MP Type 3: PIM-SSM Type 4: PIM-ASM Type 5: PIM-Bidir Type 6: Ingress Replication (IR) Type 7: mLDP MP2MP
No.
What is BGP-LS?
BGP-LS is designed to capture link state IGP and TE information and transport it across the network.
What is profile 1
Default MDT − MLDP MP2MP − PIM C−mcast Signaling (Basic mLDP) The MP2MP tree is a bidirectional tree that represents and emulated LAN. When used with C- PIM signaling, it forms a full-mesh of all VPN participants, which is determined by the VRF’s VPN-ID.
What is profile 3?
Default MDT − GRE − BGP−AD − PIM C−mcast Signaling
What is profile 6?
VRF MLDP − In−band Signaling
What is profile 7?
Global MLDP In−band Signaling
What is Profile 8?
Global Static − P2MP−TE P2MP
What is Profile 9?
Default MDT − MLDP − MP2MP − BGP−AD − PIM C−mcast Signaling
What is Profile 10?
VRF Static – P2MP TE - BGP−AD
What is profile 11?
Default MDT − GRE − BGP−AD − BGP C−mcast Signaling
What is profile 12?
Default MDT − MLDP − P2MP − BGP−AD − BGP C−mcast Signaling
What is profile 13?
Default MDT − MLDP − MP2MP − BGP−AD − BGP C−mcast Signaling
What is profile 14?
Partitioned MDT – MLDP P2MP – BGP-AD – BGP C-mcast signaling
What is profile 17?
Default MDT – MLDP P2MP – BGP-AD – PIM C-mcast signaling
What is Multicast on Fast Reroute?
MoFRR is a feature used to ensure high availability for multicast traffic.
What is an MVPN extranet?
Networks that have been extended outside of an intranet to provide reachability to external organizations. an MVPN extranet exists when sources are in one VPN and receivers are in another VPN.
What is FRR with MPLS-TE?
If a link or node within the path of a TE tunnel fails, a pre-signaled backup path is available and traffic can be routed into the backup tunnel as soon as the failure is detected.
What is PLR?
The point of local repair is the head-end of the backup path. When a failure is detected, it routes packets into the backup tunnel.
What is MP?
The merge point is the tail-end of the backup path. When traffic arrives at the MP, it is routed along the normal TE path again, merging the traffic back on the original path.
What is Path Protection?
Pre-signals a backup path from head to tail on a per path-option basis to be used in case of a failure anywhere along the path.
What is NHOP protection?
Next-hop protection (link protection) protects the path to the next-hop by routing around failed links.
What is NNOP Protection?
Next-next-hop protection (node protection) protects the path to the hop after the next-hop by routing around failed nodes.
What are the two ways of achieving FRR with RFC4090?
- N:1 or many-to-one or facility backup. The PLR pushes a new FRR label (wraps the existing MPLS packet) as part of a new TE tunnel.
- 1:1 or one-to-one or detour backup. The PLR swaps the top label rather than pushes a new one.
How does PBTS/CBTS work?
Class and Policy Based Tunnel Selection (CBTS/PBTS) are mechanisms of mapping EXP values to different tunnels in XE and XR, respectively.
What are 5 things the Control Word is capable of?
- Pad small packets:
- Carry control bits for certain layer 2 protocols
- Preserve the sequence of frames
- Facilitate load sharing
- Facilitate fragmentation/reassembly: Using Beginning and Ending (B and E) bits, AToM frames can be fragmented and reassembled for transit over MPLS. P routers cannot fragment AToM packets.
What is Multisegment PW stitching?
a way to terminate PWs on a common node and have that router bridge the two PWs together. In this way, the PW is “stitched” to provide layer-2 transport end to end.
Describe the BGP holdtime
Sets the Hold Timer in seconds for each BGP neighbor. Upon receipt of an UPDATE or KEEPALIVE, the Hold Timer resets to the initial value.
Which BGP holdtime is preferred? What is the minimum holdtime?
Smaller, 3 seconds or 0
Describe the BGP router-id
32-bit unique number that identifies the BGP router in the advertised prefixes as the BGP Identifier. The RID can be used as a loop prevention mechanism for routers
What does a pod do in regards to Kube?
Pods add a layer of abstraction to grouped containers, which helps you schedule workloads and provide necessary services like networking and storage to those containers.
How else can Kubernetes help with pods?
Other parts of Kubernetes help you load balance across these pods and ensure you have the right number of containers running to support your workloads.
What is the advantage of a container?
Containers isolate software from its environment and ensure that it works uniformly despite differences for instance between development and staging.
Will containerized software always run the same?
Yes, regardless of infrastructure, available for windows and linux
How does PBTS work?
PBTS works by selecting tunnels based on the classification criteria of the incoming packets, which are based on the IP precedence, experimental (EXP) , or type of service (ToS) field in the packet.
Who benefits by using PBTS?
PBTS will benefit Internet service providers (ISPs) who carry voice and data traffic through their MPLS and MPLS/VPN networks, who want to route this traffic to provide optimized voice service.
What is WDM?
Wavelength division multiplexing (WDM) is a method of transmitting many different wavelengths of light onto a single fiber media.
What does DWDM run on? What is the diameter?
single-mode fiber, which is built for long-haul transmissions at higher data rates and has a diameter of 9 um.
What is the core diameter of MMF?
62.5 um
Within the BGP AS-path attribute, how are confederations identified?
Within a confederation, the values are placed into a parenthesized list and treated as a single AS.
What 3 main components comprise PBB?
- Backbone component: Contains a destination address (B-DA), source address (B-SA), the ethertype 0x88A8 as defined in 802.1ad for QinQ tunneling, and a B-tag to represents the backbone VLAN.
- Service component: Contains ethertype 0x88E7 (defined for PBB) and an I-SID (24-bit service ID).
- Original frame: This could be an IP packet inside of an Ethernet frame (0x0800), an Ethernet frame inside of dot1q with a single C-tag (0x8100), or part of a hierarchical bridging architecture with two tags already on it (0x88A8).
What are the ERP messages called?
ring automatic protection switching (R-APS) series of messages.
How does ERP handle link failure?
A failure along the ring triggers an R-APG signal failure (R-APS SF) failure, and when the RPL owner receives this message, the port is immediately unblocked.
Is CFM required for ERP?
Switches participating in ERPS must be part of the same CFM domain as a prerequisite to ERPS working.
Are CFM MEPS required for ERP?
No, but it is recommended to configure CFM MEPs; although this is not required, it allows for additional CFM monitoring
How does backscatter traceback work?
combines ACLs, remotely triggered blackholes (sometimes), sinkholes, and ICMP unreachables to determine the ASBR ingress routers from which an attack has entered the network.
What else does GR do for EIGRP?
it also assists with stuck-in-active (SIA) events where a route has unanswered queries from at least one peer regarding its reachability status.
How is the RS-bit used in EIGRP GR?
the restart bit (RS-bit) is set in the hello packets towards all peers. Those who receive and understand this message immediately send their EIGRP topology tables to the restarting router. When complete, an end-of-table (EoT) message is sent to signal the end of the topology transfer.
Does BGP flowspec occur in the control plane or data plane?
Data plane, even though the rules are written into the NLRI
What is RTBH?
Remotely triggered black holes - blackholes traffic to/from certain prefixes during a DDoS attack.
Describe latency
latency refers to any of several kinds of delays typically incurred in processing of network data.
Describe Jitter
variation in the latency on a packet flow between two systems, when some packets take longer to travel from one system to the other.
Describe RSVP-TE
Like a normal TE tunnel, each sub-tunnel (also called sub- LSP) can request FRR treatment, make bandwidth reservations, and do any other kind of TE CSPF parameter tuning.
How does MLDP work?
This works like LDP where labels are exchanged on a hop-by-hop basis.
What kind of trees does MLDP support?
mLDP can support P2MP trees, It can also support MP2MP trees, which are similar to PIM-Bidir where traffic can flow in either direction towards the root, which is the main junction point.
How are labels are assigned in MP2MP trees?
upstream and downstream labels are exchanged.
Which is more efficient, P2MP or MP2MP?
P2MP - like PIM SSM
Which uses less state, P2MP or MP2MP?
MP2MP - like PIM BSR
How do customer exchange PIM in draft-rosen?
PEs would form PIM neighbors inside the VRF and the tunnel-mesh would look like an emulated LAN.
How do customers exchange PIM in basic mLDP MP2MP trees?
Same as draft-rosen.
Why was BGP extended to do c-mcast signalling?
To achieve better scalability
What new c-mcast route-types does BGP introduce?
IPv4/v6 MVPN SAFI, PIM equivalent of (*,G) join and an (S,G) join.
What is the result of receiving a PIM join from a CE in BGP?
Receiving a PIM (*,G) or (S,G) join from the CE will trigger the creation of a BGP Type-6 or Type-7 route, respectively.
What is I-PMSI?
Inclusive-PMSI - The I-PMSI tunnel connects to all PEs on the MVPN and sends multicast data to these PEs regardless of whether these PEs have receivers.
What is S-PMSI?
Selective-PMSI - S-PMSI tunnels solve the I-PMSI problem by sending multicast data only to PEs interested in the data.
How does MoFRR work?
adjusts how RPF works with traditional PIM. When the PIM last hop router (LHR) receives an IGMP join, whether ASM or SSM, it will originate some kind of PIM join.
MoFRR allows a router to send multiple PIM joins towards the root of the tree for diversity.
What are some reasons to add virtualization in the POP and Data Center?
- Reduce CAPEX (Fewer Chassis)- Reduce OPEX (deploy fewer chassis, simplify topologies)- Reduce environmental impact
What are the two main types of virtualized router entities, as defined by their physical and operational characteristics?
- A Hardware-Isolated Virtual Router (HVR) has hardware-based resource isolation between routing entities.- A Software-Isolated Virtual Router (SVR) comprises software-based resource isolation between routing entities.
Within SVR, what are some models for achieving virtualization?
- Multiple guest operating systems to overlay on a host operating system.2. Integrate the virtualization into the kernel itself.3. Virtualization is in the individual applications.
What is the impact of using the SVR overlay model?
Doesn’t scale well because it introduces significant contention of resources and users tend to over provision resources on all SVRs wasting resources.
What is the impact of integrating the virtualization in the kernel with SVR?
This model may improve processing performance but suffers from resource contention and increased complexity and instability in the kernel.
What is the impact of providing virtualization in the applications with SVR?
Scales better because of lower overhead but complicates a number of issues because the application must some level of virtualization.
Does SVR share data plane or control plane resources?
Yes. All SVR models share resources in the data plane, requiring vigilant resource monitoring.
Does HVR share data plane and control plane?
No. It dedicates both control and data plane resources on a per-module boundary to individual virtual entities so there is no sharing of resources, other than a lightweight shim layer that provides low-level communication between HVRs.
What HVR technology does Cisco IOS XR provide support for?
Secure Domain Routers (SDRs)
Define SDR
An HVR technology that provides full isolation between virtual routing instances through the use of Distributed Route Processors (DRPs) for extra control plane resources.
How are SDRs defined on a per-slot boundary?
With entire Route Processors (RPs) and Modular Services Cards (MSCs) dedicated to an SDR.
Describe Satellite network virtualization
Satellite switches act as extensions to the ASR9k, they are under the complete control and configuration management of the host router.
What is the main advantage to using Nv?
Port Density - A single 24-port Ten Gigabit Ethernet line card on the Cisco ASR 9000 Series Router could integrate up to 24 satellite switches each with 44 GigE ports; this results in an effective port density of 1056 Gigabit Ethernet ports for each Cisco ASR 9000 Series Router line card slot.
What types of topologies are supported by the Satellite System?
Hub and Spoke network topologyDual Home network topologySimple Ring topologyLayer 2 Fabric network topology
Does the Nv switch have to be co-located with the host router?
No, they can be in geographically distinct locations
What is NFV?
Network Function Virtualization - decouples network functions from hardware and puts them in software. Example: vFirewalls, vRouters, load balancer, etc.
In Long term evolution (LTE), what is the UE?
User equipment like a cellphone. Each UE carries a Universal integrated circuit card (UICC) In LTE the cellphone carries a Subscriber Identity module (SIM) which identifies a phones number, billing plan, etc.
Describe eNobeB
These are base stations that control the mobile nodes in one or more calls. A base station that is supporting a specific mobile node is reference as the mobile node’s “serving eNB”. LTE mobile nodes can only communicate with one base station at a time.
What are the 2 primary functions of eNB?
Send/receive radio transmissions and to control low-level signaling such as handover commands.
Why are eNBS connected to each other?
To support mobility events for packet forwarding and handover using the X2 interface.
What interface does the eNB use to communicate with upstream networks?
S1 interface.
How do UEs talk to eNBs?
Via the LTE-Uu interface.
Describe RAN
(Radio Access Network) This is a way of providing backhaul from access networks to the provider’s core network.
What is UMTS?
Universal Mobile Telecommunications System - This was the third generation 3G network upon which 4G LTE was built. This was a combination of circuit and packet switched architectures which was more hierarchical.
What is E-UTRAN?
Evolved UMTS Terrestrial RAN. This encompasses the entire LTE access network, which consists of eNB radios.
What is BTS?
Base transceiver station - eNB, is the element in E-UTRA of LTE that is the evolution of the element Node B in UTRA of UMTS. It is the hardware that is connected to the mobile phone network that communicates directly wirelessly with mobile handsets (UEs), like a base transceiver station (BTS) in GSM networks.
What is the Uniform QoS model?
Uniform is a QoS model whereby changes in the SP network are propagated to the customers.
What is QPPG?
QoS Policy Progagation through BGP - BGP NLRI carries the QoS markings for specific routes
In Ios, how do you push traffic over a designated VPWS PW?
Under the AC interface add the command ‘preferred-path interface Tunnel85’
How is traffic stitched in a VPLS?
PW and VFI are bridged. Bridge domain acts like l2 switch, PW intefaces and VFI act like connections to a switch.
How are MACs learned over VPLS?
Through the flood and learn approach
What defines PE membership in a VPLS domain?
The route-target.
What is GCC1 and GCC2?
General communications channel - defined by G.709 is an in-band side channel used to carry transmission management and signaling information within optical transport network elements.
Four bytes (each of two bytes) within ODUk overhead. These bytes are used for client end-to-end information and shouldn’t be touched by the OTN equipment.
What is a TE Mesh group?
MPLS Traffic Engineering AutoTunnel Mesh Groups (referred to as mesh groups) allow a network administrator to configure traffic engineering (TE) label-switched paths (LSPs) by using a few command line interface (CLI) commands.
How does a member get added to an auto-tunnel mesh?
you must configure each existing TE LSR to be a member of the mesh by using a minimal set of configuration commands.
What is the benefit of Mesh groups?
- Minimize the initial configuration of the network. You configure one template interface per mesh that propagates to all mesh tunnel interfaces, as needed.
- Minimize future configurations resulting from network growth. Eliminates the need to reconfigure each existing TE LSR in order to establish a full mesh of TE LSPs whenever a new PE router is added to the network.
- Existing routers set up TE LSPs to new PE routers.
- Automatically construct a mesh of TE LSPs among the PE routers.
How do you setup a mesh of tunnels?
- Enable autotunnel mesh groups globally. See the “Enable AutoTunnel Mesh Groups Globally” section.
- Create an access-list.
- Create one or more template interfaces.
What is the ACL used for in auto tunnel mesh setup?
The access-list determines the destination addresses for the mesh tunnel interfaces.
What is the purpose of the template interface with auto-tunnel mesh?
The template interface allows you to enter commands once per mesh group. These commands specify how mesh tunnel interfaces will be created. Each time a new router is added to the network, a new mesh tunnel interface is created and that configuration is duplicated from the template. Each mesh tunnel interface has the same path constraints and other parameters configured on the template interface. Only the tunnel destination address is different.
How do you specify a range of mesh tunnel interfaces?
mpls traffic-eng auto-tunnel mesh tunnel-num min 1000 max 2000
Describe ECP
Embedded Packet Capture is used in Cisco IOS on the router and captures the packets sent and received. The packets are stored within a buffer in DRAM and are thus not persistent through a reload. Once the data is captured, it can be examined in a summary or detailed view on the router.
How can packets be viewed using EPC?
exported into PCAP (Wireshark), or on the router.
What is the basic EPC config
Basic EPC Configuration
Define the location where the capture will occur:
Associate a filter. The filter may be specified inline, or an ACL or class-map can be referenced:
Start the capture:
The capture is now active. Allow it to collect the necessary data.
Stop the capture:
Examine the capture in a summary view:
Examine the capture in a detailed view:
In addition, export the capture in PCAP format for further analysis:
Once the necessary data has been collected, remove the capture:
What interfaces are supported with EPC?
The capture can be performed on physical interfaces, sub-interfaces, and tunnel interfaces.
Name the standards AFIs
1 - IPv4
2- IPv6
Name the standard SAFIs
sub-address family idenitifiers
SAFI/Meaning
1 Unicast
2 Multicast
3 Unicast and multicast
4 MPLS Label
128 MPLS-labeled VPN
What are the two BFD modes?
There are two operating modes to BFD, asynchronous mode and demand mode.
How does BFD operate in Asynchronous mode?
The asynchronous mode is similar to the hello and holddown timers, BFD will keep sending hello packets (called BFD control packets) and when you don’t receive some of them, the session is teared down.
How does BFD operate in Demand mode?
once BFD has found a neighbor it won’t continuously send control packets but only uses a polling mechanism. Another method has to be used to check reachability, for example it could check the receive and transmit statistics of the interface.
What is echo mode for BFD?
Both modes also support something called echo mode. When a device sends BFD echo packets then the receiver will return them without processing them. When the sender doesn’t get the echo packets back, it knows something is wrong and will tear down the session.
Describe 2547oDMVPN
MPLS over DMVPN - DMVPN provides two key advantages for extending MPLS VPNs to the branches, bulk encryption and, more importantly, a scalable overlay model.
How is MPLS extended to the branches in 2547odmvpn?
WAN edge router (Hub) is a P router that can label switch packets between branches.
Branches act as PE routers use LDP and IGP for signalling L3VPN
What is the OSPF downward-bit used for in MPLS L3VPN?
Loop Prevention
Where can the OSPF DN bit be set?
In the type 3, 5, 7 LSA and the domain-tag for type 5 and 7
How does the DN-bit prevent loops?
When an OSPF LSA type 1 route is advertised to the PE2, then redistributed into VPNv4 and advertised to another PE2, then redistributed back into an OSPF area as a type 3 LSA with redundant uplinks. Route doesn’t get re-advertised back to BGP as locally originated route.
How does B4 operate?
The IPv4 packets entering B4 are encapsulated using a IPv6 tunnel and sent to the Address Family Transition Router (AFTR).
What does the AFTR do?
This is the router that terminates the tunnel from the B4. It decapsulates the tunneled IPv4 packet, translates the network address and routes to the IPv4 network.
What does the AFTR do with packets coming from the internet?
Reverse network address translated and the resultant IPv4 packets are sent the B4 using a IPv6 tunnel.
What is the main characteristic of GPON?
Its main characteristic is the use of passive splitters in the fibre distribution network.
How do splitters play a role in GPON?
They enable one single feeding fibre from the provider’s central office to serve multiple homes and small businesses.
How does RSVP-TE allocate labels?
Headend router sends a PATH request first to the tail-end and then the Tail end router replies back with RESV which includes the FEC-to-Label mapping towards the head end.
What do containers in a pod share?
IP address, IPC, hostname, and other resources
What do pods abstract from underlying container?
Network and storage which simplifies moving containers around cluster
How are ansible modules written and executed?
Written to be resource models of the desired state of the system - how all systems inter-relate.
Ansible then executes these modules (over SSH by default), and removes them when finished
What traffic can continue forwarding due to NSF?
functions like ARP, BFD, ACL, and QoS, because the LC has a FIB and can forward.
Which TLVs are used in MPLS Traffic Engineering?
Extended IS neighbor TLV #22
Extended IS reachability TLV#135
Router ID TLV #134
Which PIM mode is traffic routed only along a bidirectional shared tree that is rooted at the rendezvous point (RP) for the group
Bi-directional
How is Bidir-PIM membership signalled?
Explicit Joins
What does bgp additional-paths install do?
Installs additional routes in RIB and CEF to same prefix destination.
How does bgp additional-paths install improve routing?
Can limit hot potato routing, limit MED oscillations, help with mx, next-hop failures.