Acn Weekly Test Question Bank
Acn Weekly Test Question Bank
Acn Weekly Test Question Bank
12. Draw IPv6 Address Representation (EUI-64) for Global and Stateless Auto-
configuration:
Stateless auto-configuration in IPv6 uses the EUI-64 format, which converts a 48-bit
MAC address to a 64-bit interface identifier by inserting FFFE in the middle and
inverting the 7th bit.
13. Explain Dual Stack IP implementation:
Dual Stack refers to running IPv4 and IPv6 simultaneously on the same network.
Devices and applications can handle both protocols, ensuring compatibility during the
transition from IPv4 to IPv6.
14. Describe transition from IPv4 to IPv6:
The transition from IPv4 to IPv6 can be achieved through:
Router Solicitation (RS): A message sent by a host to discover routers on the local
link.
Router Advertisement (RA): A message sent by routers in response to RS,
containing information like the prefix and default gateway that the host can use.
22. Explain ICMP message categories: Query and Error reporting with
subcategories in short:
Query Messages: Include Echo Request/Reply (used for ping), and Address Mask
Request/Reply.
Error Reporting Messages: Include Destination Unreachable, Time Exceeded, and
Parameter Problem.
23. Explain Border Gateway Protocol (BGP) and state any two characteristics:
BGP: A protocol used for exchanging routing information between autonomous
systems (AS).
Characteristics:
o Path Vector Protocol: Uses path information (the AS path) to determine the
best route.
o Policy-Based Routing: Routes are selected based on policies set by the
network administrators.
Distance Vector Protocol: Routes are calculated based on distance metrics (hop
count). Each router sends its routing table to its neighbors.
Link State Protocol: Routers have full knowledge of the network topology. Each
router computes the shortest path to every other router using algorithms like
Dijkstra's.
1. Generation:
The device generates a link-local address based on its MAC address. It uses the EUI-
64 format, which inserts FFFE in the middle of the MAC address.
2. Uniqueness Test (Duplicate Address Detection - DAD):
The device sends a Neighbor Solicitation (NS) message to ensure that no other device
on the network is using the same address. If a Neighbor Advertisement (NA) is
received in response, the address is already in use, and the process fails.
3. Address Assignment:
If the address is unique (no response to the NS message), the link-local address is
assigned to the interface.
4. Router Contact:
The device contacts a router by sending a Router Solicitation (RS) message to obtain
more configuration information.
5. Router Direction:
The router responds with a Router Advertisement (RA), which includes information
about global prefixes, default gateways, and whether to use stateful auto-configuration
(DHCPv6).
6. Global Address Configuration:
If global configuration is required, the device generates a globally unique address
based on the prefix provided in the RA message and completes the stateless auto-
configuration.
27. List and explain RIP timers:
RIP (Routing Information Protocol) uses the following timers to manage routing updates and
maintain route accuracy:
1. Periodic Timer:
Defines how often a router sends out its routing table updates. The default value is 30
seconds.
2. Expiration Timer (Invalid Timer):
If a route isn't updated or refreshed within the expiration time, the route is marked as
invalid. The default value is 180 seconds.
3. Garbage Collection Timer:
After a route is marked invalid, it remains in the routing table for this period before
being removed entirely. During this time, it is still advertised with an infinite metric.
The default value is 240 seconds.
4. Flush Timer:
Specifies the time it takes for a route to be removed from the routing table after it
becomes invalid. This is often set slightly longer than the expiration timer to allow
updates to come in before the route is flushed.
1. Classless:
OSPF supports Variable Length Subnet Mask (VLSM) and Classless Inter-Domain
Routing (CIDR).
2. Link-State Algorithm:
OSPF uses Dijkstra’s algorithm to calculate the shortest path, providing faster
convergence than distance-vector protocols.
3. Fast Convergence:
OSPF converges quickly due to its use of link-state advertisements (LSAs) and
incremental updates.
4. Supports Hierarchical Routing:
OSPF divides large networks into smaller areas, reducing the size of routing tables
and improving efficiency.
5. Multicast Support:
OSPF uses multicast addresses to communicate with routers, reducing network traffic
(using 224.0.0.5 for all OSPF routers and 224.0.0.6 for OSPF DR/BDR).
6. Load Balancing:
OSPF supports equal-cost load balancing, allowing traffic to be distributed over
multiple paths with equal cost.
7. Authentication:
OSPF can authenticate routing updates, providing security against unauthorized
routing information.
8. Support for IPv4 and IPv6:
OSPFv2 is used for IPv4, and OSPFv3 is used for IPv6, offering broad support across
network environments.
29. Give significance of ICMP Checksum; give an example of checksum calculation:
The ICMP (Internet Control Message Protocol) Checksum is used to ensure the integrity
of ICMP messages. It detects errors in the header and data during transmission. If the
checksum value does not match upon receipt, the packet is discarded, and an error may be
generated.
For instance, if the message is 4500 0034 1c46 4000, the sum is 1dce, and the one's
complement is e231. This becomes the checksum.
1. Open:
This message establishes a connection between two BGP peers. It contains
information like the BGP version, AS (Autonomous System) number, and hold time.
2. Update:
The most important BGP message, it is used to advertise new routes or withdraw
previously advertised routes.
3. Keep-alive:
Sent periodically to ensure that the connection between BGP peers remains active and
functional. If not received within the hold time, the connection is considered down.
4. Notification:
Sent when an error is detected. It terminates the connection between peers, providing
details about the error.
1. Triangular Routing:
Occurs in mobile IP networks when packets travel through the mobile node's home
network even if the communication is between two nodes on the same foreign
network. This leads to inefficiency and increased latency.
2. Double Crossing:
Refers to the situation in which packets cross the same network boundary multiple
times, often because of inefficient routing policies or network configurations. This
can cause increased latency and bandwidth usage, especially in international or long-
distance communications.
32. Explain routing example with graph and routing tables for each node; assume any
node diagram:
In this example, let’s assume a simple network with four routers (A, B, C, D). Each router has
a direct link to its neighboring routers. Using the Dijkstra’s shortest path algorithm or
another suitable algorithm, the routing tables are filled with the shortest path to each
destination node. The routing table includes the destination, next hop, and the cost (hop count
or metric).
36. Explain Record Route, Strict Source-route Record, Loose Source-route Record:
Record Route: Option in the IP header that records the route taken by a packet.
Strict Source-route Record: Specifies the exact route a packet must take through the
network.
Loose Source-route Record: Allows the packet to specify a partial route, with
intermediate routers deciding the rest