Escolar Documentos
Profissional Documentos
Cultura Documentos
Faculty of ICT
S1 2010
Q1.
For the diagram below and the configuration shown which one of the following statements
about what router B will advertise to router A is correct?
Router B
ip route 10.1.4.0 255.255.255.0 10.1.1.10
!
interface serial 0
ip summary-address eigrp 10.1.2.0 255.255.254.0
!
router eigrp 100
redistribute static 1000 1 255 1 1500
network 10.2.2.2 0.0.0.1
network 10.1.2.0 0.0.0.255
10.1.2.0/24
(a)
(b)
(c)
(d)
Marks(+3 -1)
Q2.
What action does an EIGRP Router take when it cannot find a feasible successor for a
network?
(a) It transitions from active to passive state for that network and queries its neighbors
(b) It transitions from passive to active state for that network and queries its neighbors.
(c) It examines the routing table for a next best path.
(d) It examines the topology table for a next best path.
Marks(+3 -1)
Q3.
Faculty of ICT
S1 2010
The diagram below shows EIGRP running over a multipoint frame relay connection.
Basic connectivity is established and then the following commands are given on the
respective routers:
HQ(config) interface serial 0/0
HQ(config-if)bandwidth 128
East(config)# interface serial 0/0
East(config-if)# bandwidth 64
West(config)# interface serial 0/0
West(config-if)# bandwidth 64
How much bandwidth on the Serial 0/0 interface on HQ is reserved for EIGRP traffic to East over
this multipoint frame relay connection?
(a)
32.
(b)
64.
(c)
128.
(d)
Q4.
An administrator types in the command router ospf 1 and receives the error message:
OSPF process 1 cannot start
What should be done to correctly set up OSPF?
(a)
Ensure that an interface has been configured with an IP address and is up.
(b)
(c)
(d)
Ensure that the interfaces can ping their directly connected neighbours.
Faculty of ICT
S1 2010
Marks(+3 -1)
Q5.
In the diagram below, OSPF has been configured on all routers in the network, and Area 1
has been configured as a NSSA.
Redistributed RIP and EIGRP routes will appear in Area 1. They will be advertised via
type 5 LSAs.
(c)
Only redistributed RIP routes will appear in Area 1. They will be advertised via type 7
LSAs.
(d)
Only redistributed EIGRP routes will appear in Area 1. They will be advertised via type 7
LSAs.
Marks(+3 -1)
Q6.
In an IS-IS LAN environment, what happens when the designated IS router crashes?
(a)
A new election process occurs immediately, establishing a new DIS until a router with a
higher priority or MAC address establishes an adjacency.
(b)
A new election process occurs immediately, establishing a new DIS that remains in place
indefinitely.
(c)
The elected backup designated router takes the place of the DIS temporarily until the
original DIS comes back online.
(d)
The elected backup designated router takes the place of the DIS indefinitely.
Marks(+3 -1)
Q7.
(a)
Which one of the following alternatives best defines what a NET is?
An NSAP address with NSEL value of 00. It refers to the router itself and consists of an
Area ID and a System ID.
Faculty of ICT
S1 2010
(b)
An NSAP address with an inter-domain part (IDP) and domain-specific part (DSP).
(c)
(d)
A HEX translation of the dotted decimal IP address notation and padded out with zeros.
Marks(+3 -1)
Q8.
What does the use of the command, isis circuit-type, allow the administrator to achieve in
the situation shown below?
(a)
(b)
(c)
(d)
Q9.
What does the route-map below do for the network shown? Assume that these are all of the
configuration statements relating to route-maps on router West. Choose the most correct
alternative.
Faculty of ICT
S1 2010
West(config-route-map)#exit
(a)
Nothing.
(b)
Directs traffic destined for the internet from network 192.168.1.0 out serial 0/0.
(c)
Directs traffic destined for the internet from network 172.16.1.0 out serial 0/1.
(d)
Q10.
(a)
(b)
The safest way is to redistribute routes on all of the boundary routers within a network.
(c)
The safest way is to redistribute routes in one direction only and on only one boundary
router within the network.
(d)
The safest way is to redistribute routes in both directions and on all of the boundary
routers within the network.
Marks(+3 -1)
Q11.
(a)
Allow the traffic if it matches the criteria specified by the match statement.
(b)
(c)
Route the traffic based on the defined policy if it matches the criteria specified by the
match statement.
(d)
Route the traffic through the gateway of last resort if no match is found in the route map
statements.
Marks(+3 -1)
Q12.
(a)
Routing loops.
(b)
Suboptimal routing.
(c)
(d)
Q13.
(a)
(b)
(c)
(d)
Faculty of ICT
S1 2010
Q14.
(a)
(b)
Router R1 will deny the 172.16.1.0/26 route while permitting the 172.16.1.64/27 route to
be advertised.
(c)
Router R1 will deny the 172.16.1.64/27 route while permitting the 172.16.1.0/26 route to
be advertised.
(d)
Q15.
When a BGP neighbour does not share a common subnet, what is required to gain
connection
(a)
(b)
(c)
(d)
Q16. In BGP when a router is peering/neighbouring its state may cycle between active and idle.
The neighbour may not know how to get back to this router. Which one of the following is
not a reason for this cycling.
(a)
The neighbour does have a route to the source IP address of the BGP open packet
generated by this router
(b)
(c)
The neighbour does not have a neighbour statement for this router
(d)
Faculty of ICT
S1 2010
Q17. Refer to the diagram and the given configuration below. Routers RTA and RTB are running
BGP but the session is in the active state. Which one of the following alternatives gives the
command(s) that must be added to establish the BGP session?
hostname RTA
!
interface loopback 0
ip address 10.10.10.2 255.255.255.255
!
interface serial 0/0
ip address 172.16.10.2 255.255.255.252
!
interface serial 0/1
ip address 172.16.10.6 255.255.255.252
!
router bgp 65200
neighbor 10.10.10.1 remote-as 65300
neighbor 10.10.10.1 update-source loopback 0
neighbor 10.10.10.1 ebgp-multihop 1
(a) network 10.10.10.0
(b)
no synchronization
Q18. How many IP multicast addresses map to a layer 2 MAC multicast address?
(a)
(b)
16
(c)
32
(d)
512
Marks(+3 -1)
Q19.
(a)
This command is useful when many neighbors have the same outbound policies.
(b)
With this command updates are generated once per peer group.
(c)
This command defines a template with parameters set for a group of neighbors instead of
individually.
(d)
Faculty of ICT
S1 2010
Q20. What techniques are used to allow IPv4 to work with IPv6?
(a)
PAT-VPN
(b)
Tunnelling
(c)
High stack
(d)
2121:0:0ABC:BABE:0:0:0001:4000
(b)
2121:0:0ABC:BABE:0:0:1:4000
(c)
2121:0:ABC:BABE::1:4000
(d)
2121::ABC:BABE::1:4.
Marks(+3 -1)
End of PART A
Faculty of ICT
S1 2010
Part B
B1.
(a)
State all of the tables that are used in the EIGRP routing process. Explain how these tables are
used to build the final table used to determine the path selection of data packets. Show the correct
sequence in which tables are built and how they provide the information for the next table.
Marks (3+6=9)
The network shown illustrates router Cs EIGRP tables. Routers A and B have established a neighbor
relationship with router C. Both routers A and B have paths to network 10.1.1.0/24, among many others
that are not shown. Router A has an EIGRP metric of 1000 for 10.1.1.0/24, so router A advertises
10.1.1.0/24 to router C with a metric of 1000. Router C installs the route to 10.1.1.0/24 via router A in its
EIGRP topology table with an advertised distance of 1000.
Router B has network 10.1.1.0/24 with a metric of 1500 in its IP routing table, so router B advertises
10.1.1.0/24 to router C with an advertised distance of 1500. Router C places the route to 10.1.1.0/24
network via router B in the EIGRP topology table with an advertised distance of 1500.
Router C has two entries to reach 10.1.1.0/24 in its topology table. The EIGRP metric for router C to reach
both routers A and B is 1000. This cost (1000) is added to the respective advertised distance from each
router, resulting in the feasible distances from router C to reach network 10.1.1.0/24 shown in the figure.
Router C chooses the least-cost feasible distance, which is 2000, via router A, and installs it in the IP
routing table as the best route to reach 10.1.1.0/24. The EIGRP metric in the routing table is equal to the
feasible distance from the EIGRP topology table. Router A is the successor for
Faculty of ICT
S1 2010
10.1.1.2
192.168.16.0
192.168.17.0
192.168.18.0
192.168.19.0
192.168.20.0
B
10
10
D
30
10.2.2.2
20
EIGRP
AS 100
Can unequal load balancing be achieved in the diagram above when sending data from RTA to
RTD? Explain your answer in detail, ie if yes explain how and if not explain why not.
Marks(1+5=6)
Answer
NO
The reason is that the FD for the path A-D is 20. Also the RD or AD from C-D is 20 ie not less than FD.
Hence there is no other path to D which follows the rules in DUAL. If it was less than 20 would use the
variance command.
EIGRP config on Router A:
Faculty of ICT
S1 2010
B2.
i)
The following displays the routing table of an OSPF router in a standard area.
The first column O indicates that the routes are OSPF routes. The second column displays an IA, E2
or nothing. What type of OSPF routes do these indicate?
Marks (3)
The O indicates that the route comes from within the OSPF area
The O IA indicates a route that has come from another area
The O E2 indicates that the route has originated from a non-ospf area or is an external route
ii) The following displays the same routing table but the OPSF area type has been changed.
What type of OSPF area has been configured to produce the above routing table? What has
happened to the E2 route?
Marks (4)
The area has been configured as a stub.
External routes are no longer visible in the routing table, but are converted to an intra-area efault
route. This is because a stub area does not accept type 5 LSA and these are converted
a type 3 LSA.
iii)
Faculty of ICT
S1 2010
The following displays the same routing table, with some further changes made to the ABR
router
iv)
The following now shows the same routing table with one further change to the ABR router.
Explain what has caused this final change to the routing table?
Marks (3)
(v)
Faculty of ICT
S1 2010
For the diagram shown below identify the type of summarization that needs to take place at router
A and D?
D
C
Marks (3)
Summary Address n/w mask
Area 0 range n/w mask
B3.
Given the following output, answer the questions by completing the table below.
Marks(1+1+1+1+1+2+3)=10
R1(config)# router isis
R1(config-router)# net 49.0001.1111.1111.1111.00
R1(config-router)# interface fastethernet 0/0
R1(config-if)# ip router isis
R1(config-if)# isis priority 100
R1(config-if)# interface loopback 0
R1(config-if)# ip router isis
R2(config)# router isis
R2(config-router)# net 49.0001.2222.2222.2222.00
R2(config-router)# interface fastethernet 0/0
R2(config-if)# isis priority 150
R2(config-if)# ip router isis
R2(config-if)# interface loopback 0
R2(config-if)# ip router isis
R3(config)# router isis
R3(config-router)# net 49.0001.3333.3333.3333.00
R3(config-router)# interface fastethernet 0/0
R3(config-if)# ip router isis
R3(config-if)# isis priority 90
R3(config-if)# interface loopback 0
R3(config-if)# ip router isis
Area address
R1 System ID
R2 System ID
R3 System ID
NSEL
0001
1111.1111.1111
2222.2222.2222
3333.3333.3333
00
Why?
R1
B4.
Faculty of ICT
S1 2010
The network shown in the diagram below is connected and configurations are placed on each of
the routers with the various routing protocols.
Redistribution is configured between OSPF and EIGRP on R2. It is necessary to filter R3s Loopbacks 25
and 30 networks from getting redistributed into EIGRP on R2. Configure
an access list that matches these two network addresses and a route map that denies based on a match for
that access list. Show your commands below. Make sure you identify the router and the configuration
prompt.
Marks(3+9+3=15)
Answers
R2(config)# access-list 1 permit 192.168.25.0
R2(config)# access-list 1 permit 192.168.30.0
3 marks
Now configure a route map with a statement that denies based on a match with
this access list. Then add a permit statement without a match statement, which
acts as an explicit permit all.
R2(config)# route-map SELECTED-DENY deny 10
R2(config-route-map)# match ip address 1
R2(config-route-map)# route-map SELECTED-DENY permit 20
9 marks
Finally, apply this route map by redoing the redistribute command with the
route map under the EIGRP process.
R2(config)# router eigrp 1
R2(config-router)# redistribute ospf 1 route-map SELECTED-DENY metric 64 100
255 1 1500
3 marks
If you previously configured a default metric under EIGRP, you can simply use:
R2(config-router)# redistribute ospf 1 route-map SELECTED-DENY
B5.
Faculty of ICT
S1 2010
The network shown below is connected and both iBGP and eBGP are configured to allow the
users in AS64512 to have a backup path to the Internet Service Provider (ISP). Note that only the
loopback networks have been advertized through BGP.
Path
64512 i
64512 i
i
Will a ping to Loopback0 on SanJose1 issued from the ISP l succeed or fail. Explain your answer
in detail as to why it didnt work.
Marks(1+3=4)
It will not work because SanJose1 does not know about the originating network of the ping packet and as
such will drop the packet (4 Marks)
(b)
Faculty of ICT
S1 2010
The update-source option of the neighbor command overrides the default source IP address used for
BGP packets. It is necessary to tell the router which IP address to use as the source address for all BGP
packets if you want to use a loopback interface instead of the physical interface. (3 Marks)
(c)
Can the the update-source command be used between two routers running BGP in different ASs?
Explain.
Marks(1+3=4)
Yes. (1 Mark)
If a loopback interface is used instead of the directly connected interface, additional configuration is
required. To allow the router to accept and attempt BGP connections to external peers residing on
networks that are not directly connected, you must configure the neighbor ip-address ebgp-multihop
[ttl] router configuration command. ( 3 Marks)
(d)
Explain when you would use Local Preference, and when you would use MED in BGP.
Local Preference is used only within an autonomous system between IBGP speakers to Marks(4)
determine the best path to leave the autonomous system to reach an outside network (2 marks)
The MED is exchanged between autonomous systems via EBGP peers, and is used to influence the
inbound traffic to your autonomous system. (2 marks)
B6.
These questions relate to IPv6.
(a) Outline the two main parts an IPv6 address has.
Faculty of ICT
S1 2010
Marks (3)
A subnet prefix representing the network to which the interface is connected. The subnet prefix is a fixed
64-bit length for all current definitions.
A local identifier, sometimes called a token, which uniquely identifies the host on the local network. The
local identifier is always 64 bits and is dynamically created based on Layer 2 media and encapsulation. In
the simple case of an Ethernet medium, the local identifier is usually derived from the EUI-48 MAC
address.
(b)
(c)
Broadcast addressing in IPv4 results in several problems. What are these problems? How does
IPv6 get around this issue?
Marks (2+3=5)
Broadcasts generate a number of interrupts in every computer on the network, which involves
every device to process the packet to see if it is for that device. (1 mark)
In the extreme case broadcasts can trigger malfunctions that completely halt an entire network.
This is known as a broadcast storm (1 mark)
IPv6 has replaced broadcasts with multicast addressing. Multicast enables efficient network
operation by sending requests to a limited number of computers on the network, and is processed
only by those interfaces identified by that address (3 marks)
What can be deduced from the diagram below?
Marks (2)
conf t
ipv6 unicast-routing
interface ethernet0
ip address 192.168.99.1 255.255.255.0
ipv6 address 3ffe:b00:c18:1::3/127
B7.
(a)
Faculty of ICT
S1 2010
Source Distribution Trees simplest form of multicast distribution tree, with the root at the source and
branches forming a tree toward the receivers. SPT (shortest path tree) is identified by the notation (S,G)
where S = IP address of source and G = multicast group address.
Shared Distribution Trees share a common root called a rendezvous point (RP) placed at a chosen
point in the network. The source traffic is sent to the RP, which then forwards the traffic to reach all
receivers. Notation is (*,G) where * = all sources and G = multicast group address. (2 Marks)
(b)
Multicast distribution trees define the path from the source to the receivers over which the multicast
traffic flows. (2 marks)
(c)
IM dense mode (PIM-DM) initially floods traffic out of all non-RPF interfaces where there is
another PIM-DM neighbor or a directly connected member of the group.
Multicast traffic being sent by the source is flooded throughout the entire network. As each router
receives the multicast traffic via its RPF interface (the interface in the direction of the source), it
forwards the multicast traffic to all of its PIM-DM neighbors.
This results in some traffic arriving via a non-RPF interface, as with the two routers in the center
and far right of the figure. Packets arriving via the non-RPF interface are discarded. These nonRPF flows are normal for the initial flooding of data and are corrected by the normal PIM-DM
pruning mechanism.
PIM-DM prune messages are sent (denoted by dashed arrows) to stop the unwanted traffic.
Prune messages are also sent on non-RPF interfaces to shut off the flow of multicast traffic,
because it is arriving via an interface that is not on the shortest path to the source. The example of
prune messages sent on a non-RPF interface can be seen on the routers in the middle and far right
of the figure.
Prune messages are sent on an RPF interface only when the router does not have any downstream
receivers for multicast traffic (1 mark for each point).
End of Part B
END OF EXAM
Faculty of ICT
S1 2010
________________________________________
ANSWERS
Question
1
2
B1
3
B2
4
B3
5
B4
6
B5
7
B6
8
B7
9
TOTAL
10
Exam
11Total
12
13
14
15
16
17
18
19
20
21
22
23
24
25
TOTAL
Answer