Ch 1 - Characteristics of Routing Protocols Flashcards

1
Q

What is the maximum hop count for RIPng?

A
  1. Max hop count for RIPv1, RIPv2 and RIPng are all 15.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the address router advertisements are sent to in RIPv2?

A

224.0.0.9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the two primary metrics of EIGRP?

A

Bandwidth and delay. Reliability, load and MTU size can also be used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does an LSA advertise?

A

Networks a router knows how to reach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Does a link-state routing protocol exchange the full routing table?

A

Yes. When the adjacency is first formed, initially.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is OSPF metric cost based on?

A

Link speed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name 3 reasons OSPF is popular. Cool algorithm name does not count!

A

Vendor interoperability, scalability, fast convergance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How is a route ‘poisoned’ by a DV protocol?

A

Route received on an interface is advertised back out the receiving interface with a metic of infinity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does Split Horizon not allow a router to do?

A

Advertise a route back to where it was learned from

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Give two examples of a path vector router?

A

BGP, M-BGP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

T/F: BGP is popular because of it’s nearly infinite scalability and fast convergence time.

A

False. BGP actually has a slow convergence time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What do IPv6 global unicast addresses begin with?

A

2000::/3 The first 3 bits are 001, so the first hex number in the first quartet is either 2 or 3.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What multicast IPv4 address does BGP use for router advertisements?

A

None. BGP is unicast only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the range of IPv4 multicast addresses?

A

224.0.0.0-239.255.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Give an example of a directed broadcast IPv4 address.

A

172.16.255.255 - a local broadcast is 255.255.255.255.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

T/F: NBMA supports broadcast but not multicast.

A

False. NBMA supports neither broadcast nor multicast. This is a problem for EIGRP and OSPF.

A non-broadcast multiple access network (NBMA) is a computer network to which multiple hosts are attached, but data is transmitted only directly from one computer to another single host over a virtual circuit or across a switched fabric. NBMA networks do support multicast or broadcast traffic manually (pseudo-broadcasts). Some common examples of nonbroadcast network technologies include Asynchronous Transfer Mode (ATM), Frame Relay, X.25, and home power line networking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the IPv4 header “identification” field used for? How many bits is it?

A

16 bit value used to mark fragments so they can be reassembled in the right order by the receiving device.

See attached diagram. Field descriptions:

  1. Version: This Field defines the version of IP. It is Static 4 bit value.
  2. Header Length: This Field defines the length of the datagram header. It is 4 bit value.
  3. Type of Service: It is 8 bit value. It is used tell the network how to treat the IP packet. These bits are generally used to indicate the Quality of Service (QoS) for the IP Packet.
  4. Packet Length: 16 bit value indicating the size of the IP Packet in terms of bytes. This gives a maximum packet size of 65536 bytes.
  5. Identification: 16 bit field used for reassembling the packet at the destination.
  6. Flags: It is 3 bits value. It indicates if the IP packet can be further fragmented or not and if the packet is the last fragment or not of a larger transfer.
  7. Fragment offset: 13 bit value used in the reassembly process at the destination.
  8. Time to Live: 8 bit value telling the network how long an IP packet can exist in a network before it is destroyed.
  9. Protocol: 8 bit value used to indicate the type of protocol being used (TCP, UDP etc.).
  10. Header checksum: It is 16 bit value. It is used to indicate errors in the header only. Every node in the network has to check and re-insert a new checksum as the header changes at every node.
  11. Source address: 32 bit value representing the IP address of the sender of the IP packet.
  12. Destination address: 32 bit value representing the IP address of the packets final destination.
  13. Options: Options are not required for every datagram. They are used for network testing and debugging.
  14. Padding: Variable size bit field. These bits are used to ensure a 32 bit boundary for the header is achieved.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The IPv4 header 4 bit “version” field is set to 0100, what does this indicate?

A

0100 indicates IPv4

See attached diagram. Field descriptions:

  1. Version: This Field defines the version of IP. It is Static 4 bit value.
  2. Header Length: This Field defines the length of the datagram header. It is 4 bit value.
  3. Type of Service: It is 8 bit value. It is used tell the network how to treat the IP packet. These bits are generally used to indicate the Quality of Service (QoS) for the IP Packet.
  4. Packet Length: 16 bit value indicating the size of the IP Packet in terms of bytes. This gives a maximum packet size of 65536 bytes.
  5. Identification: 16 bit field used for reassembling the packet at the destination.
  6. Flags: It is 3 bits value. It indicates if the IP packet can be further fragmented or not and if the packet is the last fragment or not of a larger transfer.
  7. Fragment offset: 13 bit value used in the reassembly process at the destination.
  8. Time to Live: 8 bit value telling the network how long an IP packet can exist in a network before it is destroyed.
  9. Protocol: 8 bit value used to indicate the type of protocol being used (TCP, UDP etc.).
  10. Header checksum: It is 16 bit value. It is used to indicate errors in the header only. Every node in the network has to check and re-insert a new checksum as the header changes at every node.
  11. Source address: 32 bit value representing the IP address of the sender of the IP packet.
  12. Destination address: 32 bit value representing the IP address of the packets final destination.
  13. Options: Options are not required for every datagram. They are used for network testing and debugging.
  14. Padding: Variable size bit field. These bits are used to ensure a 32 bit boundary for the header is achieved.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How many bits in the IPv4 header “TOS field” and what is it used for?

A

The TOS field is an 8 bit field used to set QoS markings. The 6 leftmost bits are the DSCP marking (Differentiated Service Code Point) and the 2 rightmost bits are used for Explicit Congestion Notification, which is an extension of WRED, Weighted Random Early Detection and used for flow control.

See attached diagram. Field descriptions:

  1. Version: This Field defines the version of IP. It is Static 4 bit value.
  2. Header Length: This Field defines the length of the datagram header. It is 4 bit value.
  3. Type of Service: It is 8 bit value. It is used tell the network how to treat the IP packet. These bits are generally used to indicate the Quality of Service (QoS) for the IP Packet.
  4. Packet Length: 16 bit value indicating the size of the IP Packet in terms of bytes. This gives a maximum packet size of 65536 bytes.
  5. Identification: 16 bit field used for reassembling the packet at the destination.
  6. Flags: It is 3 bits value. It indicates if the IP packet can be further fragmented or not and if the packet is the last fragment or not of a larger transfer.
  7. Fragment offset: 13 bit value used in the reassembly process at the destination.
  8. Time to Live: 8 bit value telling the network how long an IP packet can exist in a network before it is destroyed.
  9. Protocol: 8 bit value used to indicate the type of protocol being used (TCP, UDP etc.).
  10. Header checksum: It is 16 bit value. It is used to indicate errors in the header only. Every node in the network has to check and re-insert a new checksum as the header changes at every node.
  11. Source address: 32 bit value representing the IP address of the sender of the IP packet.
  12. Destination address: 32 bit value representing the IP address of the packets final destination.
  13. Options: Options are not required for every datagram. They are used for network testing and debugging.
  14. Padding: Variable size bit field. These bits are used to ensure a 32 bit boundary for the header is achieved.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Explain the role of the 3 bits in the IPv4 header “IP Flags” field.

A

1st bit is always zero. 2nd bit = DF field (Don’t Fragment), and the 3rd bit = MF (More Fragments) which is set in all fragments except the very last one.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the function of the IPv4 header “fragment offset” field?

A

Specifies the offset of a fragment from the beginning of the first fragment, in 8 byte units. 13 bit field.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How many bits is the IPv4 header “TTL” field, or what is it’s maximum value?

A

8 bits = 256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

T/F: The IPv4 header” checksum” field in an IP header performs a check on UDP.

A

True. This 16-bit field performs error checking for TCP, IP and UDP too.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What does an IPv6 header version field of 0110 indicate?

A

0110 indicates IPv6

The IPv6 header is more streamlined: it contains 8 fields, compared to IPv4’s 14 fields.

version: 4 bits long, and corresponds to IPv4’s field of the same name. It indicates the receiver the IP version to expect. In case of IPv6 that is of course 6, making this field’s binary value 0110.

traffic class: 8 bits long, and replaces IPv4’s ‘type of service’ field. The first 6 bits contain the differentiated services (DiffServ) designation of the packet, and is called differentiated services code point (DSCP). DSCP classifies the type of traffic carried by the packet for quality of service (QoS) purposes. For example, streaming media like video and audio on a conference call can enjoy lower latency than non-critical traffic, such as web browsing. The last two bits are for optional explicit congestion notifications (ECN). ECN can be used to signal congestion on the network by marking it in the IPv6 header. (Instead of dropping packets.)

flow label: 20 bits long, and new to IPv6. Useful for real-time applications, it signals the receiving node (routers or switches) to keep packets on the same path as to prevent them from being reordered.

payload length: 16-bits long. Contains the size of the payload in octets (remember those?) and can include extension headers. (Extensions headers replace the ‘options’ field known from IPv4.) It’s set to zero when the packet carries a jumbo payload.

next header: 8-bits long. It shares its function (and values) with IPv4’s ‘protocol’ field, and as the name suggests specifies the type of the next header.

hop limit: 8-bits long, formerly known in IPv4 as ‘time-to-live’. Decremented by one passing each node, and the packet is discarded when the value of hop limit reaches zero.

source address: 128 bits long, same function as in IPv4. Contains the IPv6 address of the node originally sending the packet.

destination address: 128 bits long, same function as in IPv4. Contains the IPv6 address of the destination node for which the packet is intended.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What IPv4 header field performs the same function as Traffic Class field in IPv6?

A

TOS, same size too, 8 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the IPv6 header “Flow Label” field used for?

A

The FL field tells the router to use a specific outbound connection for a traffic flow. By using the same connection the probability of packets arriving out of order is reduced.

The IPv6 header is more streamlined: it contains 8 fields, compared to IPv4’s 14 fields.

  • version: 4 bits long, and corresponds to IPv4’s field of the same name. It indicates the receiver the IP version to expect. In case of IPv6 that is of course 6, making this field’s binary value 0110.
  • traffic class: 8 bits long, and replaces IPv4’s ‘type of service’ field. The first 6 bits contain the differentiated services (DiffServ) designation of the packet, and is called differentiated services code point (DSCP). DSCP classifies the type of traffic carried by the packet for quality of service (QoS) purposes. For example, streaming media like video and audio on a conference call can enjoy lower latency than non-critical traffic, such as web browsing. The last two bits are for optional explicit congestion notifications (ECN). ECN can be used to signal congestion on the network by marking it in the IPv6 header. (Instead of dropping packets.)
  • flow label: 20 bits long, and new to IPv6. Useful for real-time applications, it signals the receiving node (routers or switches) to keep packets on the same path as to prevent them from being reordered.
  • payload length: 16-bits long. Contains the size of the payload in octets (remember those?) and can include extension headers. (Extensions headers replace the ‘options’ field known from IPv4.) It’s set to zero when the packet carries a jumbo payload.
  • next header: 8-bits long. It shares its function (and values) with IPv4’s ‘protocol’ field, and as the name suggests specifies the type of the next header.
  • hop limit: 8-bits long, formerly known in IPv4 as ‘time-to-live’. Decremented by one passing each node, and the packet is discarded when the value of hop limit reaches zero.
  • source address: 128 bits long, same function as in IPv4. Contains the IPv6 address of the node originally sending the packet.
  • destination address: 128 bits long, same function as in IPv4. Contains the IPv6 address of the destination node for which the packet is intended.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

T/F: The ‘next header’ field in an IPv6 packet usually indicates a specific L4 protocol.

A

True. It indicates the type of header encapsulated in an IPv6 packet.

28
Q

If a PC sends an ARP request to the default gateway through a switch, does it get back the MAC of the switch or the MAC of the router’s interface?

A

Router. The switch will update it’s MAC address table with the MACs from the incoming frames.

29
Q

Are ARPs used for Serial interfaces?

A

No. Serial interfaces do not have MAC addresses.

30
Q

How many bytes is an ICMP header?

A

4 bytes. One byte for Type, one for Code and two for checksum.

31
Q

How may bits is the Type Code field in an ICMP header

A

8 bytes.

One byte for Type, one for Code and two for checksum.

32
Q

What is the ICMP header type code for an Echo Request, in binary.

A

0000 1000 (8)

Common ICMP codes:

  • Type 0 — Echo Reply
  • Type 1 — Unassigned
  • Type 2 — Unassigned
  • Type 3 — Destination Unreachable
  • Type 4 — Source Quench (Deprecated)
  • Type 5 — Redirect
  • Type 6 — Alternate Host Address (Deprecated)
  • Type 7 — Unassigned
  • Type 8 — Echo Request
33
Q

What is the ICMP header type code for Destination Unreachable, in binary?

A

0000 0011 (3)

Common ICMP codes:

  • Type 0 — Echo Reply
  • Type 1 — Unassigned
  • Type 2 — Unassigned
  • Type 3 — Destination Unreachable
  • Type 4 — Source Quench (Deprecated)
  • Type 5 — Redirect
  • Type 6 — Alternate Host Address (Deprecated)
  • Type 7 — Unassigned
  • Type 8 — Echo Request
34
Q

What is the ICMP header type code for Echo Reply, in binary?

A

0000 0000

Common ICMP codes:

  • Type 0 — Echo Reply
  • Type 1 — Unassigned
  • Type 2 — Unassigned
  • Type 3 — Destination Unreachable
  • Type 4 — Source Quench (Deprecated)
  • Type 5 — Redirect
  • Type 6 — Alternate Host Address (Deprecated)
  • Type 7 — Unassigned
  • Type 8 — Echo Request
35
Q

What is the ICMP header type code for Redirect, in binary?

A

0000 0101 (5)

Common ICMP codes:

  • Type 0 — Echo Reply
  • Type 1 — Unassigned
  • Type 2 — Unassigned
  • Type 3 — Destination Unreachable
  • Type 4 — Source Quench (Deprecated)
  • Type 5 — Redirect
  • Type 6 — Alternate Host Address (Deprecated)
  • Type 7 — Unassigned
  • Type 8 — Echo Request
36
Q

What is the purpose of an ICMP redirect packet?

A

To let the sending host know that the network has changed and that a different route should be used.

37
Q

How many bits in a TCP Source Port? how many possible values are there?

A

16 bits. 2^16 = 65,536

38
Q

What is the range of values for an initial sequence number?

A

1 - 4G or 32 bits = 2^32 = 4,294,967,295

39
Q

If the last sequence number received was 367,872,901, what ACK is sent back?

A

367,872,902

40
Q

T/F: The window field is a 16 bit field that specifies the number of bits a sender is willing to send before receiving an ACK.

A

False. Close… the number of bytes a sender is willing to send is the right answer!

41
Q

T/F: MSS refers to the amount of data in a segment and does not include headers for L2/L3/L4.

A

True. MSS refers only to the amount of data in a segment. It is not the size of the entire segment. More specifically, MSS is a parameter of the options field of the TCP header that specifies the largest amount of data, specified in bytes, that a computer or communications device can receive in a single TCP segment.

42
Q

If there is a successful ACK for 2 segments, how big will the sliding window be for the next transmission?

A
  1. The window size doubles for each successful transmission. It grows exponentially until a packet is lost.
43
Q

T/F: if a TCP flow drops a packet, the window size is reduced to 1.

A

True. The window will then increase exponentially, doubling in size with every successful transmission until the window size is 1/2 the ‘congestion window size’, the point at which the congestion was experienced. The window grows linearly from that point on. This is called “slow start”.

44
Q

T/F: If a router’s output queue fills up then all flows start to drop packets, causing all TCP flows to slow start.

A

True. This is called global synchronization or TCP synchronization leading to VERY SLOW performance. WRED, Weighted random early detection, attempts to avoid this situation. WRED is a queueing discipline for a network scheduler suited for congestion avoidance For example, a queue may have lower thresholds for lower priority packet. A queue buildup will cause the lower priority packets to be dropped, hence protecting the higher priority packets in the same queue. In this way quality of service prioritization is made possible for important packets from a pool of packets using the same buffer.

45
Q

WRED, Weighted Early Random Detection, pseudo randomly drops packets based on QoS markings in packets in an attempt to keep the queues from filling up.

A

True. This mechanism avoids global synch problem.

46
Q

T/F: A router can re-sequence out of order packets or re-request them with an ACK.

A

False. Actually TCP is responsible for this.

47
Q

How many fields are in an UDP header?

A
  1. Source Port, Destination Port, Length, and Checksum.
48
Q

What is RTP, Real Time Transport Protocol, used for?

A

Real-time Transport Protocol is the primary protocol for voice and video. It is a L4 protocol that is encapsulated in UDP,

49
Q

What is the maximum recommended 1-way latency for voice and video over RTP?

A

Cisco recommends 150ms, max for good quality video.

50
Q

What is the recommended queueing method for voice and video over RTP:

A

LLQ - Low Latency Queueing. This is a priority queueing method for voice and video traffic.

51
Q

List 4 things to check on before you start, or methods to aid in, a migration to IPv6.

A
  1. check equipment compatability
  2. run dual-stack to allow for gradual migration
  3. confirm ISP support of IPv6
  4. Configure NAT64 to NAT from v6 to v4
  5. Use NPTv6- Network Prefix Translate for v6 to v6 translations
  6. IPv6 over IPv4 tunnel. Encapsulate v6 in v4 packets.
52
Q

T/F: When migrating to to a new routing protocol the AD can be used to aid in a gradual migration.

A

True. By forcing the AD to be higher on the new routes, you can confirm routes, next hops, metrics etc before going live.

53
Q

T/F: Route redistribution can be used to aid in a routing protocol migration.

A

True. one segment at a time can be done with this.

54
Q

What is EVN?

A

Easy Virtual Networking. EVN uses a VNET trunk to carry traffic for each virtual network. This eliminates the need for multiple sub-ifs.

55
Q

T/F: EVN traffic is tagged with a VNET tag.

A

True.

56
Q

T/F: An EVN router connects to a Catalyst switch by a 802.1Q trunk.

A

True.

57
Q

T/F: Route Replication is a service in EVN that allows routes to be shared between virtual networks.

A

True.

58
Q

Which of the following features prevents a route learned on one interface from being advertised back out of that interface? a. Poison Reverse b. Summarization c. Split Horizon d. Convergence

A

C. The Split Horizon feature prevents a route learned on one interface from being advertised back out of that same interface. The Summarization feature allows multiple contiguous networks to be represented with a single route advertisement. The Poison Reverse feature causes a route received on one interface to be advertised back out of that same interface with a metric considered to be infinite. Convergence is the speed at which a backup route takes over for a failed preferred route.

59
Q

Identify the distance-vector routing protocols from the following. (Choose the two best answers.) a. IS-IS b. EIGRP c. RIP d. OSPF e. BGP

A

B and C. Both RIP and EIGRP are distance-vector routing protocols, although EIGRP is considered an advanced distance-vector routing protocol. Both OSPF and IS-IS are link-state routing protocols, and BGP is a path-vector routing protocol.

60
Q

Select the type of network communication flow that is best described as “one-to-nearest.” a. Unicast b. Multicast c. Broadcast d. Anycast

A

D. A unicast network communication flow is considered a “one-to-one” flow, because there is one source and one destination. A multicast network communication flow is considered a “one-to-many” flow, because there is one source and potentially many destinations (specifically, destinations that have joined a multicast group). A broadcast network communication flow is considered a “one-to-all” flow, because there is one source, and the destinations include all devices in a subnet. An anycast network communication flow is considered as “one-to-nearest” flow, because there are multiple devices assigned the same IPv6 address, and traffic is routed from one source to the nearest device assigned the destination IPv6 address.

61
Q

An NBMA network has which of the following design issues? (Choose the two best answers.) a. Split Horizon issues b. Bandwidth issues c. Quality of service issues d. Designated router issues

A

A and D. A nonbroadcast multiaccess (NBMA) network can have Split Horizon issues in a hub-and-spoke topology, because a route learned by the hub router from a spoke router might not be advertised back out to any other spoke routers, because of Split Horizon operation. Also, if the NBMA network is using OSPF, there can be designated router issues, because the spoke routers might not be able to communicate with one another through broadcasts.

62
Q

Which of the following best defines TCP MSS?

a. The total data in a TCP segment, including only the TCP header
b. The total data in a TCP segment, not including any headers
c. The total data in a TCP segment, including only the IP and TCP headers
d. The total data in a TCP segment, including the Layer 2, IP, and TCP headers

A

B. The term TCP Maximum Segment Size (MSS) seems to imply the size of the entire Layer 4 segment (that is, including Layer 2, Layer 3, and Layer 4 headers). However, TCP MSS only refers to the amount of data in the segment (without the inclusion of any headers).

63
Q

A network segment has a bandwidth of 10 Mbps, and packets experience an end-to-end latency of 100 ms. What is the bandwidth-delay product of the network segment? a. 100,000,000 bits b. 10,000,000 bits c. 1,000,000 bits d. 100,000 bits

A

C. The bandwidth-delay product of a segment is the measure of the maximum number of bits that can be on the segment at any one time. The bandwidth-delay product is calculated by multiplying the segment’s bandwidth (in bits/sec) by the latency that packets experience as they cross the segment (in sec). In this question, the bandwidth-delay product can be calculated as follows: bandwidth-delay product = 10,000,000 bits/sec * 0.1 sec = 1,000,000 bits.

64
Q

When migrating from a PVST+ to Rapid-PVST+, which PVST+ features can be disabled, because similar features are built into Rapid-PVST+? (Choose the two best answers.) a. UplinkFast b. Loop Guard c. BackboneFast d. PortFast

A

A and C. When converting a Cisco Catalyst switch to Rapid-PVST+, you can remove the UplinkFast and BackboneFast features, because similar features are built into Rapid-PVST+. However, the following features can still be used with Rapid-PVST+: PortFast, BPDU Guard, BPDU Filter, Root Guard, and Loop Guard.

65
Q

Cisco EVN uses what type of trunk to carry traffic for all virtual networks between two physical routers? a. VNET b. ISL c. dot1Q d. 802.10

A

A. Cisco Easy Virtual Network (EVN) uses a Virtual Network Trunk (VNET Trunk) to carry traffic for each virtual network, and eliminates the need to manually configure a sub-interface for each virtual network on all routers. Inter-Switch Link (ISL) is a Cisco-proprietary trunking technology for Ethernet networks. IEEE 802.1Q is an industry-standard trunking technology for Ethernet networks. IEEE 802.10 is an industry-standard trunking technology for FDDI networks.