Você está na página 1de 19

Swinburne University of Technology

HIT3713 Internetworking Routing

Faculty of ICT
S1 2010

Swinburne University of Technology


Faculty of Information and Communication Technologies
HIT3713 Internetwork Routing
Semester 1, 2010
PART A
Note: There is only one correct answer for each question.

Q1.

For the diagram below and the configuration shown which one of the following statements
about what router B will advertise to router A is correct?
Router B
ip route 10.1.4.0 255.255.255.0 10.1.1.10
!
interface serial 0
ip summary-address eigrp 10.1.2.0 255.255.254.0
!
router eigrp 100
redistribute static 1000 1 255 1 1500
network 10.2.2.2 0.0.0.1
network 10.1.2.0 0.0.0.255

10.1.2.0/24

(a)

B will advertise 10.1.2.0/23 to A.

(b)

B will advertise 10.1.3.0/24 to A.

(c)

B will advertise 10.1.2.0/24 to A.

(d)

B will advertise 10.1.4.0/24 to A.

eigrp stub connected

Marks(+3 -1)
Q2.

What action does an EIGRP Router take when it cannot find a feasible successor for a
network?

(a) It transitions from active to passive state for that network and queries its neighbors
(b) It transitions from passive to active state for that network and queries its neighbors.
(c) It examines the routing table for a next best path.
(d) It examines the topology table for a next best path.
Marks(+3 -1)

Swinburne University of Technology


HIT3713 Internetworking Routing

Q3.

Faculty of ICT
S1 2010

The diagram below shows EIGRP running over a multipoint frame relay connection.
Basic connectivity is established and then the following commands are given on the
respective routers:
HQ(config) interface serial 0/0
HQ(config-if)bandwidth 128
East(config)# interface serial 0/0
East(config-if)# bandwidth 64
West(config)# interface serial 0/0
West(config-if)# bandwidth 64

How much bandwidth on the Serial 0/0 interface on HQ is reserved for EIGRP traffic to East over
this multipoint frame relay connection?

(a)

32.

(b)

64.

(c)

128.

(d)

None of the above.


Marks(+3 -1)

Q4.

An administrator types in the command router ospf 1 and receives the error message:
OSPF process 1 cannot start
What should be done to correctly set up OSPF?

(a)

Ensure that an interface has been configured with an IP address and is up.

(b)

Ensure that an interface has been configured with an IP address.

(c)

Ensure that IP classless is enabled on the router.

(d)

Ensure that the interfaces can ping their directly connected neighbours.

Swinburne University of Technology


HIT3713 Internetworking Routing

Faculty of ICT
S1 2010

Marks(+3 -1)
Q5.

In the diagram below, OSPF has been configured on all routers in the network, and Area 1
has been configured as a NSSA.

Which statement concerning NSSA Area 1 is correct?


(a)

No redistributed routes can appear in Area 1, only summary routes


(b)

Redistributed RIP and EIGRP routes will appear in Area 1. They will be advertised via
type 5 LSAs.

(c)

Only redistributed RIP routes will appear in Area 1. They will be advertised via type 7
LSAs.

(d)

Only redistributed EIGRP routes will appear in Area 1. They will be advertised via type 7
LSAs.
Marks(+3 -1)

Q6.

In an IS-IS LAN environment, what happens when the designated IS router crashes?

(a)

A new election process occurs immediately, establishing a new DIS until a router with a
higher priority or MAC address establishes an adjacency.

(b)

A new election process occurs immediately, establishing a new DIS that remains in place
indefinitely.

(c)

The elected backup designated router takes the place of the DIS temporarily until the
original DIS comes back online.

(d)

The elected backup designated router takes the place of the DIS indefinitely.
Marks(+3 -1)

Q7.
(a)

Which one of the following alternatives best defines what a NET is?
An NSAP address with NSEL value of 00. It refers to the router itself and consists of an
Area ID and a System ID.

Swinburne University of Technology


HIT3713 Internetworking Routing

Faculty of ICT
S1 2010

(b)

An NSAP address with an inter-domain part (IDP) and domain-specific part (DSP).

(c)

An 8 to 20 byte address consisting of an Area ID and a System ID.

(d)

A HEX translation of the dotted decimal IP address notation and padded out with zeros.
Marks(+3 -1)

Q8.

What does the use of the command, isis circuit-type, allow the administrator to achieve in
the situation shown below?

(a)

Faster convergence when interfacing with other routing protocols.

(b)

Reduce the area size.

(c)

Increase the speed of the data transfer by selecting a hardware output.

(d)

Increase the efficiency by saving memory and bandwidth.


Marks(+3 -1)

Q9.

What does the route-map below do for the network shown? Assume that these are all of the
configuration statements relating to route-maps on router West. Choose the most correct
alternative.

West(config)#access-list 1 permit 192.168.1.0 0.0.0.255


West(config)#access-list 2 permit 172.16.1.0 0.0.0.255
West(config)#route-map ISP1 permit 10
West(config-route-map)#match ip address 1
West(config-route-map)#set interface serial0/0
West(config-route-map)#exit
West(config)#route-map ISP2 permit 20
West(config-route-map)#match ip address 2
West(config-route-map)#set interface serial0/1

Swinburne University of Technology


HIT3713 Internetworking Routing

Faculty of ICT
S1 2010

West(config-route-map)#exit
(a)

Nothing.

(b)

Directs traffic destined for the internet from network 192.168.1.0 out serial 0/0.

(c)

Directs traffic destined for the internet from network 172.16.1.0 out serial 0/1.

(d)

Both (b) and (c) above.


Marks(+3 -1)

Q10.

What is the safest way to perform route redistribution?

(a)

The safest way is to redistribute routes in one direction only.

(b)

The safest way is to redistribute routes on all of the boundary routers within a network.

(c)

The safest way is to redistribute routes in one direction only and on only one boundary
router within the network.

(d)

The safest way is to redistribute routes in both directions and on all of the boundary
routers within the network.
Marks(+3 -1)

Q11.

In policy-based routing, what does a permit statement of a route map imply?

(a)

Allow the traffic if it matches the criteria specified by the match statement.

(b)

Drop all traffic if no match is found in the route map statements.

(c)

Route the traffic based on the defined policy if it matches the criteria specified by the
match statement.

(d)

Route the traffic through the gateway of last resort if no match is found in the route map
statements.
Marks(+3 -1)

Q12.

Which of the following problems can route redistribution cause?

(a)

Routing loops.

(b)

Suboptimal routing.

(c)

Difference in routing information due to differing convergence times of routing protocols.

(d)

All the above.


Marks(+3 -1)

Q13.

What is BGP synchronization?

(a)

It is the synchronization of eBGP routes with iBGP routes.

(b)

It is the synchronization of BGP attributes between BGP neighbours.

(c)

It is the synchronization of BGP routes between BGP neighbours.

Swinburne University of Technology


HIT3713 Internetworking Routing

(d)

Faculty of ICT
S1 2010

It is the synchronization of IGP routing information with BGP routing information


Marks(+3 -1)

Q14.

Router 1 is connected to networks 172.16.1.0/26 and 172.16.1.64/27. On the basis of the


partial output given below, which statement is correct?
R1#show running-config
!
router eigrp100
network 172.16.0.0
distribute-list prefix MYLIST out
auto-summary
!
ip prefix-list MYLIST seq 10 permit 172.16.1.0/26

(a)

Router R1 will advertise both routes.

(b)

Router R1 will deny the 172.16.1.0/26 route while permitting the 172.16.1.64/27 route to
be advertised.

(c)

Router R1 will deny the 172.16.1.64/27 route while permitting the 172.16.1.0/26 route to
be advertised.

(d)

Router R1 should be reconfigured with an ACL instead of an ip prefix-list command.


Marks(+3 -1)

Q15.

When a BGP neighbour does not share a common subnet, what is required to gain
connection

(a)

Configure BGP multi-hop with eBGP.

(b)

Configure BGP multi-hop with iBGP.

(c)

Cannot establish peering.

(d)

It is not necessary to share a common subnet for BGP peering.


Marks(+3 -1)

Q16. In BGP when a router is peering/neighbouring its state may cycle between active and idle.
The neighbour may not know how to get back to this router. Which one of the following is
not a reason for this cycling.
(a)

The neighbour does have a route to the source IP address of the BGP open packet
generated by this router

(b)

The neighbour is peering with the wrong address

(c)

The neighbour does not have a neighbour statement for this router

(d)

The AS numbers are misconfigured .


Marks(+3 -1)

Swinburne University of Technology


HIT3713 Internetworking Routing

Faculty of ICT
S1 2010

Q17. Refer to the diagram and the given configuration below. Routers RTA and RTB are running
BGP but the session is in the active state. Which one of the following alternatives gives the
command(s) that must be added to establish the BGP session?

hostname RTA
!
interface loopback 0
ip address 10.10.10.2 255.255.255.255
!
interface serial 0/0
ip address 172.16.10.2 255.255.255.252
!
interface serial 0/1
ip address 172.16.10.6 255.255.255.252
!
router bgp 65200
neighbor 10.10.10.1 remote-as 65300
neighbor 10.10.10.1 update-source loopback 0
neighbor 10.10.10.1 ebgp-multihop 1
(a) network 10.10.10.0
(b)

no synchronization

(c) ip route 10.10.10.1 255.255.255.255 s0/0


ip route 10.10.10.1 255.255.255.255 s0/1
(d)

neighbor 10.10.10.1 next-hop-self


Marks(+3 -1)

Q18. How many IP multicast addresses map to a layer 2 MAC multicast address?
(a)

(b)

16

(c)

32

(d)

512
Marks(+3 -1)

Q19.

In BGP what is the purpose of the command neighbour peer-group-name peer-group?

(a)

This command is useful when many neighbors have the same outbound policies.

(b)

With this command updates are generated once per peer group.

(c)

This command defines a template with parameters set for a group of neighbors instead of
individually.

Swinburne University of Technology


HIT3713 Internetworking Routing

(d)

Faculty of ICT
S1 2010

All of the above.


Marks(+3 -1)

Q20. What techniques are used to allow IPv4 to work with IPv6?
(a)

PAT-VPN

(b)

Tunnelling

(c)

High stack

(d)

Parallel stack with a multiplexed output.


Marks(+3 -1)

Q21. Given the IPv6 address of 2121:0000:0ABC:BABE:0000:0000:0001:4000, what is the


most efficient way to write the address?
(a)

2121:0:0ABC:BABE:0:0:0001:4000

(b)

2121:0:0ABC:BABE:0:0:1:4000

(c)

2121:0:ABC:BABE::1:4000

(d)

2121::ABC:BABE::1:4.
Marks(+3 -1)
End of PART A

Swinburne University of Technology


HIT3713 Internetworking Routing

Faculty of ICT
S1 2010

Part B
B1.
(a)
State all of the tables that are used in the EIGRP routing process. Explain how these tables are
used to build the final table used to determine the path selection of data packets. Show the correct
sequence in which tables are built and how they provide the information for the next table.
Marks (3+6=9)

The network shown illustrates router Cs EIGRP tables. Routers A and B have established a neighbor
relationship with router C. Both routers A and B have paths to network 10.1.1.0/24, among many others
that are not shown. Router A has an EIGRP metric of 1000 for 10.1.1.0/24, so router A advertises
10.1.1.0/24 to router C with a metric of 1000. Router C installs the route to 10.1.1.0/24 via router A in its
EIGRP topology table with an advertised distance of 1000.
Router B has network 10.1.1.0/24 with a metric of 1500 in its IP routing table, so router B advertises
10.1.1.0/24 to router C with an advertised distance of 1500. Router C places the route to 10.1.1.0/24
network via router B in the EIGRP topology table with an advertised distance of 1500.
Router C has two entries to reach 10.1.1.0/24 in its topology table. The EIGRP metric for router C to reach
both routers A and B is 1000. This cost (1000) is added to the respective advertised distance from each
router, resulting in the feasible distances from router C to reach network 10.1.1.0/24 shown in the figure.
Router C chooses the least-cost feasible distance, which is 2000, via router A, and installs it in the IP
routing table as the best route to reach 10.1.1.0/24. The EIGRP metric in the routing table is equal to the
feasible distance from the EIGRP topology table. Router A is the successor for

the route to 10.1.1.0/24.

(b) Given the following diagram:

Swinburne University of Technology


HIT3713 Internetworking Routing

Faculty of ICT
S1 2010

10.1.1.2
192.168.16.0
192.168.17.0
192.168.18.0
192.168.19.0
192.168.20.0

B
10

10

D
30
10.2.2.2

20

EIGRP
AS 100

Can unequal load balancing be achieved in the diagram above when sending data from RTA to
RTD? Explain your answer in detail, ie if yes explain how and if not explain why not.
Marks(1+5=6)
Answer
NO
The reason is that the FD for the path A-D is 20. Also the RD or AD from C-D is 20 ie not less than FD.
Hence there is no other path to D which follows the rules in DUAL. If it was less than 20 would use the
variance command.
EIGRP config on Router A:

Swinburne University of Technology


HIT3713 Internetworking Routing

Faculty of ICT
S1 2010

B2.
i)

The following displays the routing table of an OSPF router in a standard area.

The first column O indicates that the routes are OSPF routes. The second column displays an IA, E2
or nothing. What type of OSPF routes do these indicate?
Marks (3)

The O indicates that the route comes from within the OSPF area
The O IA indicates a route that has come from another area
The O E2 indicates that the route has originated from a non-ospf area or is an external route
ii) The following displays the same routing table but the OPSF area type has been changed.

What type of OSPF area has been configured to produce the above routing table? What has
happened to the E2 route?
Marks (4)
The area has been configured as a stub.
External routes are no longer visible in the routing table, but are converted to an intra-area efault
route. This is because a stub area does not accept type 5 LSA and these are converted

a type 3 LSA.

Swinburne University of Technology


HIT3713 Internetworking Routing

iii)

Faculty of ICT
S1 2010

The following displays the same routing table, with some further changes made to the ABR
router

What has caused the change in the routing table?


Marks (2)

The 172.31.11.0 network has been summarised at the ABR.

iv)

The following now shows the same routing table with one further change to the ABR router.

Explain what has caused this final change to the routing table?
Marks (3)

The area is now configured as totally stubby.


All routes from beyond the area are now only accessible from the inter-area default route.

Swinburne University of Technology


HIT3713 Internetworking Routing

(v)

Faculty of ICT
S1 2010

For the diagram shown below identify the type of summarization that needs to take place at router
A and D?

D
C

Marks (3)
Summary Address n/w mask
Area 0 range n/w mask
B3.
Given the following output, answer the questions by completing the table below.
Marks(1+1+1+1+1+2+3)=10
R1(config)# router isis
R1(config-router)# net 49.0001.1111.1111.1111.00
R1(config-router)# interface fastethernet 0/0
R1(config-if)# ip router isis
R1(config-if)# isis priority 100
R1(config-if)# interface loopback 0
R1(config-if)# ip router isis
R2(config)# router isis
R2(config-router)# net 49.0001.2222.2222.2222.00
R2(config-router)# interface fastethernet 0/0
R2(config-if)# isis priority 150
R2(config-if)# ip router isis
R2(config-if)# interface loopback 0
R2(config-if)# ip router isis
R3(config)# router isis
R3(config-router)# net 49.0001.3333.3333.3333.00
R3(config-router)# interface fastethernet 0/0
R3(config-if)# ip router isis
R3(config-if)# isis priority 90
R3(config-if)# interface loopback 0
R3(config-if)# ip router isis

Area address

R1 System ID

R2 System ID

R3 System ID

NSEL

0001

1111.1111.1111

2222.2222.2222

3333.3333.3333

00

Which Router is DIS

Why?

R1

Because it has a priority of 100

Swinburne University of Technology


HIT3713 Internetworking Routing

B4.

Faculty of ICT
S1 2010

The network shown in the diagram below is connected and configurations are placed on each of
the routers with the various routing protocols.

Redistribution is configured between OSPF and EIGRP on R2. It is necessary to filter R3s Loopbacks 25
and 30 networks from getting redistributed into EIGRP on R2. Configure
an access list that matches these two network addresses and a route map that denies based on a match for
that access list. Show your commands below. Make sure you identify the router and the configuration
prompt.
Marks(3+9+3=15)
Answers
R2(config)# access-list 1 permit 192.168.25.0
R2(config)# access-list 1 permit 192.168.30.0

3 marks

Now configure a route map with a statement that denies based on a match with
this access list. Then add a permit statement without a match statement, which
acts as an explicit permit all.
R2(config)# route-map SELECTED-DENY deny 10
R2(config-route-map)# match ip address 1
R2(config-route-map)# route-map SELECTED-DENY permit 20

9 marks

Finally, apply this route map by redoing the redistribute command with the
route map under the EIGRP process.
R2(config)# router eigrp 1
R2(config-router)# redistribute ospf 1 route-map SELECTED-DENY metric 64 100
255 1 1500
3 marks

If you previously configured a default metric under EIGRP, you can simply use:
R2(config-router)# redistribute ospf 1 route-map SELECTED-DENY

Swinburne University of Technology


HIT3713 Internetworking Routing

B5.

Faculty of ICT
S1 2010

The network shown below is connected and both iBGP and eBGP are configured to allow the
users in AS64512 to have a backup path to the Internet Service Provider (ISP). Note that only the
loopback networks have been advertized through BGP.

The following output is observed on the ISP router.


ISP#show ip bgp
BGP table version is 3, local router ID is 192.168.100.1
Status codes: s suppressed, d damped, h history, * valid, > best, i -internal
Origin codes: i - IGP, e - EGP, ? - incomplete
Network
Next Hop
Metric
LocPrf
Weight
* 172.16.0.0
192.168.1.6
0
*>
192.168.1.2
0
0
*> 192.168.100.0
0.0.0.0 0
32768
(a)

Path
64512 i
64512 i
i

Will a ping to Loopback0 on SanJose1 issued from the ISP l succeed or fail. Explain your answer
in detail as to why it didnt work.
Marks(1+3=4)

It will not work because SanJose1 does not know about the originating network of the ping packet and as
such will drop the packet (4 Marks)

Swinburne University of Technology


HIT3713 Internetworking Routing

(b)

Faculty of ICT
S1 2010

Explain the purpose of the update-source command in BGP.


Marks(3)

The update-source option of the neighbor command overrides the default source IP address used for
BGP packets. It is necessary to tell the router which IP address to use as the source address for all BGP
packets if you want to use a loopback interface instead of the physical interface. (3 Marks)

(c)

Can the the update-source command be used between two routers running BGP in different ASs?
Explain.
Marks(1+3=4)

Yes. (1 Mark)
If a loopback interface is used instead of the directly connected interface, additional configuration is
required. To allow the router to accept and attempt BGP connections to external peers residing on
networks that are not directly connected, you must configure the neighbor ip-address ebgp-multihop
[ttl] router configuration command. ( 3 Marks)

(d)

Explain when you would use Local Preference, and when you would use MED in BGP.

Local Preference is used only within an autonomous system between IBGP speakers to Marks(4)
determine the best path to leave the autonomous system to reach an outside network (2 marks)
The MED is exchanged between autonomous systems via EBGP peers, and is used to influence the
inbound traffic to your autonomous system. (2 marks)

B6.
These questions relate to IPv6.
(a) Outline the two main parts an IPv6 address has.

Swinburne University of Technology


HIT3713 Internetworking Routing

Faculty of ICT
S1 2010

Marks (3)

A subnet prefix representing the network to which the interface is connected. The subnet prefix is a fixed
64-bit length for all current definitions.

A local identifier, sometimes called a token, which uniquely identifies the host on the local network. The
local identifier is always 64 bits and is dynamically created based on Layer 2 media and encapsulation. In
the simple case of an Ethernet medium, the local identifier is usually derived from the EUI-48 MAC
address.

(b)

(c)

Broadcast addressing in IPv4 results in several problems. What are these problems? How does
IPv6 get around this issue?
Marks (2+3=5)

Broadcasts generate a number of interrupts in every computer on the network, which involves
every device to process the packet to see if it is for that device. (1 mark)
In the extreme case broadcasts can trigger malfunctions that completely halt an entire network.
This is known as a broadcast storm (1 mark)
IPv6 has replaced broadcasts with multicast addressing. Multicast enables efficient network
operation by sending requests to a limited number of computers on the network, and is processed
only by those interfaces identified by that address (3 marks)
What can be deduced from the diagram below?
Marks (2)
conf t
ipv6 unicast-routing
interface ethernet0
ip address 192.168.99.1 255.255.255.0
ipv6 address 3ffe:b00:c18:1::3/127

Interface E0 is dual stacked.

B7.

This question relates to multicast distribution trees.


Marks(2+2+6=10)

Swinburne University of Technology


HIT3713 Internetworking Routing

(a)

Faculty of ICT
S1 2010

List the two types of trees.

Source Distribution Trees simplest form of multicast distribution tree, with the root at the source and
branches forming a tree toward the receivers. SPT (shortest path tree) is identified by the notation (S,G)
where S = IP address of source and G = multicast group address.
Shared Distribution Trees share a common root called a rendezvous point (RP) placed at a chosen
point in the network. The source traffic is sent to the RP, which then forwards the traffic to reach all
receivers. Notation is (*,G) where * = all sources and G = multicast group address. (2 Marks)
(b)

What is the purpose of having a multicast distribution trees?

Multicast distribution trees define the path from the source to the receivers over which the multicast
traffic flows. (2 marks)
(c)

Explain how Protocol Independent Multicast works in Dense Mode.

IM dense mode (PIM-DM) initially floods traffic out of all non-RPF interfaces where there is
another PIM-DM neighbor or a directly connected member of the group.

Multicast traffic being sent by the source is flooded throughout the entire network. As each router
receives the multicast traffic via its RPF interface (the interface in the direction of the source), it
forwards the multicast traffic to all of its PIM-DM neighbors.

This results in some traffic arriving via a non-RPF interface, as with the two routers in the center
and far right of the figure. Packets arriving via the non-RPF interface are discarded. These nonRPF flows are normal for the initial flooding of data and are corrected by the normal PIM-DM
pruning mechanism.

PIM-DM prune messages are sent (denoted by dashed arrows) to stop the unwanted traffic.

Prune messages are also sent on non-RPF interfaces to shut off the flow of multicast traffic,
because it is arriving via an interface that is not on the shortest path to the source. The example of
prune messages sent on a non-RPF interface can be seen on the routers in the middle and far right
of the figure.

Prune messages are sent on an RPF interface only when the router does not have any downstream
receivers for multicast traffic (1 mark for each point).

End of Part B
END OF EXAM

Swinburne University of Technology


HIT3713 Internetworking Routing

Faculty of ICT
S1 2010

Student Name:________________________________________Student ID:________________


Signature:

________________________________________
ANSWERS
Question
1
2
B1
3
B2
4
B3
5
B4
6
B5
7
B6
8
B7
9
TOTAL
10
Exam
11Total
12
13
14
15
16
17
18
19
20
21
22
23
24
25
TOTAL

Answer

Você também pode gostar