Escolar Documentos
Profissional Documentos
Cultura Documentos
HKIVE (TY)
Broadband/High Performance Networks Tutorial #10
1.
2.
List two types of data links that a CE router can use to connect to the service
providers PE router.
3.
List two protocols that a PE router in a BGP/MPLS VPN network can use to
exchange routing information with its directly connected CE routers.
4.
State the protocol that PE routers in a BGP/MPS VPN network used to exchange
VPN routing information
5.
State THREE factors that can enhance the scalability of a service provider
BGP/MPLS VPN network.
6.
Besides scaling, state another TWO issues that BGP/MPLS VPNs have to solve.
7.
The VPN-IPv4 addresses are being used to solve the overlapping of customers
private IP address spaces.
i)
Draw a diagram to show the fields of an VPN-IPv4 address
ii)
What should the ADMINISTRATOR sub-field in a route distinguisher
hold when the value of the TYPE sub-field is 0?
iii)
What should the ADMINISTRATOR sub-field in a route distinguisher
(RD) hold when the value of the TYPE sub-field is 1?
iv)
State the protocol that a PE router uses to distribute its VPN-IPv4 addresses
to other PE routers within the VPN.
v)
Which of the following statements are TRUE?
(I)
Each VRF table in a PE router within a VPN can have its own unique
RD.
(II)
VPN customers are aware of the use of VPN-IPv4 address.
(III)
VPN-IPv4 addresses are carried in MP-BGP that runs across the
service provider network.
(IV)
VPN-IPv4 addresses are carried in user data packets that traverse
across the service provider network.
(V)
VPN-IPv4 addresses are used both inside and outside a service
provider network.
(VI)
In addition to IPv4, MP-BGP carries routing information for other
network layer protocols like, IPX, IPv6, VPN-IPv4, etc.
8.
Service provider can constrain the flow of customer VPN data traffic by constraining
the flow of VPN-IPv4 routing information.
i)
One way to constrain the flow of VPN-IPv4 routing information is by using
multiple VRF tables. With reference to figure 6.34 in notes, assume multiple
VRF tables are used in each PE for per-VPN segregation of routing
information and PE 2 imports customer B site 2s VPN B routes into VRF-B.
Which of the following statement(s) is(are) TRUE?
(I)
PE 2 imports local customer A site 2s VPN A routes into VRF-B.
(II)
PE 2 imports remote customer A site 1s VPN A routes into VRF-B.
(III)
PE 2 imports remote customer A site 3s VPN A routes into VRF-B.
(IV)
PE 2 imports remote customer B site 1s VPN B routes into VRF-B.
ii)
BGP extended community attributes are also used to control the distribution
of routing information between PE routers.
(a)
Is a BGP extended community has to be globally unique?
(b)
How many BGP extended communities can a customer VPN use?
(c)
List the THREE types of BGP extended community attributes that
VPNs can use.
(d)
Assume Full-Mesh-A and Full-Mesh-B are two globally
Service Provider
Network
CE 1
Customer A
Site 1
10.11/16
Exp Target = I
Imp Target = II
CE 2
Exp Target = III
Imp Target = IV
VRF-A
Customer A
Site 2
10.21/16
VRF-A
PE 1
PE 2
Exp Target = V
Imp Target = VI
CE 4
VRF-A
PE 3
Customer A
Site 3
10.31/16
LSP
9.
When the configuration of a PE router is changed, e.g. adding a new VRF table, how
can this PE router trigger other PE routers in the same service provider network to retransmit their routing information?
10.
Briefly explain how the outbound route filters can be used to reduce the number of
routing updates and hence conserve the backbone bandwidth and the processing
resources of PE routers.
11.
ii)
iii)
12.
list the two actions that PE 2 will perform after it receives from PE 1 the
route advertisement for prefix 10.11/16.
list the protocol that can be used to establish BEST-EFFORT LSPs from PE2
to PE 1.
II I
Service Provider
Network
user data
LSP 1
VRF-B
PE 1
PE 2
VRF-B
Customer B
Site 1
10.11/16
LSP 2
user data
CE 5
III IV
CE 3
Customer B
Site 2
10.21/16
13.
State THREE benefits of BGP/MPLS VPNs when compared with other L2 VPN
technologies.
14.
15.
(XII)
17.
18.
19.
20.
21.
Briefly describe the main difference in the signaling mechanism between the P2P
martini model and VPLS
22.
23.
(II)
ii)
iii)
24.
25.
Briefly describe the difference between unqualified and qualified MAC address
learning in VPLS.
26.
i)
ii)