Vous êtes sur la page 1sur 6

_________________________

Chapter 06: Routing DATE ___________


_______________
6.1 Enabling Routing Protocols 6.1.1 Routing Every router uses a ____________
________ to make decisions where to send packets. The ___________________ contai
ns a set of routes, where each route describes which gateway or interface the ro
uter needs to use to reach a specified network. routing table

2) What are the four main components of a route?


destination value
subnet mask
gateway or interface address
route cost or metric
3) Routers make their routing decisions based on which part of the packet?
Destination IP address
4) How does the router match the packet part in (3) with the correct route? Look
s for a matching destination value in the routing table
5) What does a router do if no match can be made?
Message is directed back to the gateway specified by its default route
6) What is the command on a Cisco router that will display all the routes the ro
uter knows? Show ip route
7) What are the characteristics of directly connected route? When the router pow
ers up, the configured interfaces are enabled. As the interfaces become operatio
nal, the router stores the directly attached, local-network addresses as connect
ed routes in the routing table. On Cisco routers, these routes are identified in
the routing table with the prefix C. The routes are automatically updated whene
ver the interface is reconfigured or shut down.
8) What are the characteristics of static routes? A network administrator can ma
nually configure a static route to a specific network. A static route does not c
hange until the administrator manually reconfigures it. These routes are identif
ied in the routing table with the prefix S.
9) What are the characteristics of dynamic routes? Dynamic routes are automatica
lly created and maintained by routing protocols. Routing protocols exchange rout
ing information with other routers in the network. Dynamically updated routes ar
e identified in the routing table with the prefix that corresponds to the type o
f routing protocol that created the route. For example, R is used for the Routin
g Information Protocol (RIP).
10) What is a default route? Type of static route that specifies the gateway to
use when the routing table does not contain a path for the destination network

11) In global configuration mode, what is the command used to configure a static
route? Ip route
12) Why do larger networks generally prefer dynamic routing over static routing?
In a large network, manually maintaining routing tables could require significa
nt administrative time Complete Packet Tracer Activity 6.1.1 6.1.2 Routing Pr
otocols
13) What enables routers to automatically manage information received from their
own interfaces and from other routers in order to quickly update the routes the
y know? Dynamic routing protocol
14) What do we call the method used by (13) in order to determine the best route
to a destination network and place it in the routing table? Routing algorithm

15) What two main classes of the method described in (14)? distance vector
link state
16) Whenever the topology of a network changes because of reconfiguration or fai
lure, the _____(a)_____ in all the routers must also change to reflect an accura
te view of the new topology. When all the routers in a network have updated thei
r ____(b)____ to reflect the new route, the routers are said to have __(c)____.
routing tables
tables
converged
17) In order for two routers to exchange routes, they must be using ___(a)____ a
nd therefore ___(b)____. the same routing protocol
the same routing algorithm
18) What are the two criteria used by a distance vector algorithm in order to ev
aluate the information it receives from other routers? distance

vector

19) What is a metric? A route cost


20) Which 6 factors can be used to evaluate a metric? Number of hops
Administrative cost
Bandwidth
Transmission speed
Likelihood of delays
Reliability
21) With a distance vector routing protocol, how is the best route determined? S
hortest distance or smallest metric Complete Lab 6.1.2 6.1.3 Common Interior
Routing Protocols
RIP
22) What is RIP? is a distance vector routing protocol that is used in thousands
of networks throughout the world.
23) What are 5 key characteristics of RIP? Is a distance vector routing protocol
Uses hop count as the metric for path selection
Defines a hop count greater than 15 as an unreachable route
Sends routing table contents every 30 seconds
24) What are the three advantages that make RIP widely used and popular? When a
router receives a routing update with a change, it updates its routing table to
reflect that change. If the router learns a new route from another router, it in
creases the hop count value by one before adding that route to its own routing t
able. The router uses the local network address of the directly connected router
that sent the update as the next hop address.
25) What are three disadvantages of using RIP?
Allows a maximum of 15 hops, so it can only be used for networks that connect no
more than 16 routers in a series.
Periodically sends complete copies of the entire routing table to directly conne
cted neighbors. In a large network, this can cause a significant amount of netwo
rk traffic each time there is an update.
Converges slowly on larger networks when the network changes.
26) What is the most significant difference between RIP Version 1 and Version 2?
that RIPv2 can support classless routing, because it includes the subnet mask i
nformation in routing updates
EIGRP
27) What is EIGRP? is a Cisco-proprietary, enhanced distance vector routing prot
ocol. EIGRP was developed to address some of the limitations of other distance v
ector routing protocols, such as RIP.
28) What are three key characteristics of EIGRP?
Uses a variety of metrics to calculate the cost of a route
Combines the next hop and metric features of distance vector protocols with addi
tional database and update features
Has a maximum hop count of 224 hops
29) Name and describe the two additional databases (other than the routing table
) used by EIGRP.
the neighbor table
and the topology table.
30) What is the most significant difference between Distance Vector routing prot
ocols and Link State routing protocols? Routers that use the distance vector rou
ting algorithm have little information about distant networks and none about dis
tant routers. The link-state routing algorithm maintains a full database of dist
ant routers and how they interconnect.
31) What are the 4 main features of link state routing protocols? a) Routing tab
le - List of the known paths and interfaces.
Link-state advertisement (LSA) - Small packet of routing information that is sen
t between routers. LSAs describe the state of the interfaces (links) of a router
and other information, such as the IP address of each link.
Topological database - Collection of information gathered from all the LSAs rece
ived by the router.
SPF (Shortest Path First) algorithm - Calculation performed on the database that
results in the SPF tree.
The SPF tree is a map of the network as seen from the point of view of the route
r. The information in this tree is used to build the routing table.
OSPF
32) What is OSPF? is a non-proprietary, link-state routing protocol described in
RFC 2328.
33) What are the 5 key characteristics of OSPF? Uses the SPF algorithm to calcul
ate the lowest cost to a destination
Sends routing updates only when the topology changes; does not send periodic upd
ates of the entire routing table
Provides fast convergence
Supports Variable Length Subnet Mask (VLSM) and discontiguous subnets
Provides route authentication

34) When do routers running OSPF send Link State Advertisements? List three part
icular examples.
when a change occurs, for example, when a new neighbor is added, or when a link
fails or is restored.
6.1.4 Routing Within an Organization
35) Which routing options are probably most appropriate for a small network with
one gateway to the internet? Bandwitdth
36) Which routing options would be appropriate for a growing network with severa
l routers (not exceeding 15)? Reliability
37) Which routing options are most appropriate for larger networks with more tha
n 15 routers?
Load
38) Which 3 criteria should be considered when selecting a routing protocol for
a large network?
Ease of management - What information does the protocol keep about itself? Which
show commands are available?
Ease of configuration - How many commands does the average configuration require
? Is it possible to configure several routers in the network with the same confi
guration?
Efficiency - How much bandwidth does the routing protocol use while it is in a s
teady state, and how much could it use when converging in response to a major ne
twork event? 6.1.5 Configure and Verify RIP
39) Before configuring RIP to run on a router, which 3 tasks must first be accom
plished? Before configuring RIP on a router, think about the networks a router s
erves, and the interfaces on the router that connect to these networks.
40) What are the three commands required for basic RIP configuration?

Router(config)#router rip
Router (config-router)#version 2
Router(config-router)#network [network_number]
41) Explain how each of the following actions will help verify that RIP is confi
gured and running correctly:
a) ping devices on remote networks
b) show ip protocols
c) show ip route
d) debug ip rip
Another method is to run the IP routing verification commands show ip protocols
and show ip route at the CLI prompt.
The show ip protocols command verifies that RIP routing is configured, that the
correct interfaces are sending and receiving RIP updates, and that the router is
advertising the correct networks.
The show ip route command shows the routing table, which verifies that routes re
ceived by RIP neighbors are installed in the routing table.
The debug ip rip command can be used to observe the networks advertised in the r
outing updates as they are sent and received. Debug commands display router acti
vity in real time. Because debug activity uses router processor resources, debug
ging should be used with care in a production network, because it can affect net
work operation.
Complete Packet Tracer Activity 6.1.5 Complete Lab 6.1.5 6.2 Exterior Rout
ing Protocols 6.2.1 Autonomous Systems
43) What is an autonomous system? which are independently controlled by differen
t organizations and companies.
44) Give an example of an autonomous system. ISP
45) Define ASN. Each AS is identified by a unique AS number (ASN)
46) Under what conditions would a business need to request its own ASN? Because
the company communicates through both ISP B and ISP C, this causes routing confu
sion in terms of connectivity. Traffic from the internet does not know which AS
to use to reach the large global business. 6.2.2 Routing Between Autonomous Sys
tems
47) Explain what an IGP is, and give three examples. are used to exchange routin
g information within an AS or individual organization
Examples of IGPs are RIP, EIGRP, and OSPF.
48) Explain what an EGP is and give one example. exterior gateway protocols (EGP
s) are designed to exchange routing information between different autonomous sys
tems

49) What is the most common EGP, and how many autonomous systems use it? Border
Gateway Protocol (BGP). It is estimated that 95% of autonomous systems use BGP.
6.2.3 Routing Across the Internet
50) When a host sends a packet to an address not in the same AS as the host, wha
t do the routers of the AS do with the packet? Passes it on to proper destinatio
n
51) What does an exterior router do when it receives a packet from a different A
S? Re-routes to proper destination 6.2.4 Configure and Verify BGP
52) How do ISPs usually configure the routing on a border router of at a custome
r s location? They do this by providing backup routes and routers in case the regu
lar route fails. During normal conditions, the ISP advertises the regular route
to other autonomous systems. If that regular route fails, the ISP sends an exter
ior protocol update message to advertise the backup route instead.
53) List the three steps required in enabling BGP on an exterior router. Explain
each step The first step in enabling BGP on a router is to configure the AS num
ber. This step is done with the command:
router bgp [AS_number] The next step is to identify the ISP router that is th
e BGP neighbor with which the customer premises equipment (CPE) router exchanges
information. The command to identify the neighbor router is:
neighbor [IP_address] remote-as [AS_number] When an ISP customer has its own
registered IP address block, it may want the routes to some of its internal netw
orks to be known on the Internet. To use BGP to advertise an internal route, the
network address needs to be identified. The format of the command is:
network [network_address]
54) Can BGP be used to advertise private IP addresses? Explain. On the Internet,
BGP should never be used to advertise a private network address. Complete Lab
6.2.4

Vous aimerez peut-être aussi