Académique Documents
Professionnel Documents
Culture Documents
11) In global configuration mode, what is the command used to configure a static
route? Ip route
12) Why do larger networks generally prefer dynamic routing over static routing?
In a large network, manually maintaining routing tables could require significa
nt administrative time Complete Packet Tracer Activity 6.1.1 6.1.2 Routing Pr
otocols
13) What enables routers to automatically manage information received from their
own interfaces and from other routers in order to quickly update the routes the
y know? Dynamic routing protocol
14) What do we call the method used by (13) in order to determine the best route
to a destination network and place it in the routing table? Routing algorithm
15) What two main classes of the method described in (14)? distance vector
link state
16) Whenever the topology of a network changes because of reconfiguration or fai
lure, the _____(a)_____ in all the routers must also change to reflect an accura
te view of the new topology. When all the routers in a network have updated thei
r ____(b)____ to reflect the new route, the routers are said to have __(c)____.
routing tables
tables
converged
17) In order for two routers to exchange routes, they must be using ___(a)____ a
nd therefore ___(b)____. the same routing protocol
the same routing algorithm
18) What are the two criteria used by a distance vector algorithm in order to ev
aluate the information it receives from other routers? distance
vector
34) When do routers running OSPF send Link State Advertisements? List three part
icular examples.
when a change occurs, for example, when a new neighbor is added, or when a link
fails or is restored.
6.1.4 Routing Within an Organization
35) Which routing options are probably most appropriate for a small network with
one gateway to the internet? Bandwitdth
36) Which routing options would be appropriate for a growing network with severa
l routers (not exceeding 15)? Reliability
37) Which routing options are most appropriate for larger networks with more tha
n 15 routers?
Load
38) Which 3 criteria should be considered when selecting a routing protocol for
a large network?
Ease of management - What information does the protocol keep about itself? Which
show commands are available?
Ease of configuration - How many commands does the average configuration require
? Is it possible to configure several routers in the network with the same confi
guration?
Efficiency - How much bandwidth does the routing protocol use while it is in a s
teady state, and how much could it use when converging in response to a major ne
twork event? 6.1.5 Configure and Verify RIP
39) Before configuring RIP to run on a router, which 3 tasks must first be accom
plished? Before configuring RIP on a router, think about the networks a router s
erves, and the interfaces on the router that connect to these networks.
40) What are the three commands required for basic RIP configuration?
Router(config)#router rip
Router (config-router)#version 2
Router(config-router)#network [network_number]
41) Explain how each of the following actions will help verify that RIP is confi
gured and running correctly:
a) ping devices on remote networks
b) show ip protocols
c) show ip route
d) debug ip rip
Another method is to run the IP routing verification commands show ip protocols
and show ip route at the CLI prompt.
The show ip protocols command verifies that RIP routing is configured, that the
correct interfaces are sending and receiving RIP updates, and that the router is
advertising the correct networks.
The show ip route command shows the routing table, which verifies that routes re
ceived by RIP neighbors are installed in the routing table.
The debug ip rip command can be used to observe the networks advertised in the r
outing updates as they are sent and received. Debug commands display router acti
vity in real time. Because debug activity uses router processor resources, debug
ging should be used with care in a production network, because it can affect net
work operation.
Complete Packet Tracer Activity 6.1.5 Complete Lab 6.1.5 6.2 Exterior Rout
ing Protocols 6.2.1 Autonomous Systems
43) What is an autonomous system? which are independently controlled by differen
t organizations and companies.
44) Give an example of an autonomous system. ISP
45) Define ASN. Each AS is identified by a unique AS number (ASN)
46) Under what conditions would a business need to request its own ASN? Because
the company communicates through both ISP B and ISP C, this causes routing confu
sion in terms of connectivity. Traffic from the internet does not know which AS
to use to reach the large global business. 6.2.2 Routing Between Autonomous Sys
tems
47) Explain what an IGP is, and give three examples. are used to exchange routin
g information within an AS or individual organization
Examples of IGPs are RIP, EIGRP, and OSPF.
48) Explain what an EGP is and give one example. exterior gateway protocols (EGP
s) are designed to exchange routing information between different autonomous sys
tems
49) What is the most common EGP, and how many autonomous systems use it? Border
Gateway Protocol (BGP). It is estimated that 95% of autonomous systems use BGP.
6.2.3 Routing Across the Internet
50) When a host sends a packet to an address not in the same AS as the host, wha
t do the routers of the AS do with the packet? Passes it on to proper destinatio
n
51) What does an exterior router do when it receives a packet from a different A
S? Re-routes to proper destination 6.2.4 Configure and Verify BGP
52) How do ISPs usually configure the routing on a border router of at a custome
r s location? They do this by providing backup routes and routers in case the regu
lar route fails. During normal conditions, the ISP advertises the regular route
to other autonomous systems. If that regular route fails, the ISP sends an exter
ior protocol update message to advertise the backup route instead.
53) List the three steps required in enabling BGP on an exterior router. Explain
each step The first step in enabling BGP on a router is to configure the AS num
ber. This step is done with the command:
router bgp [AS_number] The next step is to identify the ISP router that is th
e BGP neighbor with which the customer premises equipment (CPE) router exchanges
information. The command to identify the neighbor router is:
neighbor [IP_address] remote-as [AS_number] When an ISP customer has its own
registered IP address block, it may want the routes to some of its internal netw
orks to be known on the Internet. To use BGP to advertise an internal route, the
network address needs to be identified. The format of the command is:
network [network_address]
54) Can BGP be used to advertise private IP addresses? Explain. On the Internet,
BGP should never be used to advertise a private network address. Complete Lab
6.2.4