InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
What exactly do you mean by a route reflector in the context of Border Gateway Protocol? Why is it necessary? |
|
Answer» In BGP, a route reflector is a ROUTER which is capable of breaking the internal BORDER Gateway Protocol (iBGP) LOOP avoidance rule. Under certain settings, a route reflector can broadcast updates received from an iBGP peer to ANOTHER iBGP peer. By breaking the criterion and designing iBGP networks that scale quickly and cleanly, route REFLECTORS are employed to eliminate the full mesh requirement. |
|
| 2. |
Mention some of the well known BGP metric’s attributes. |
|
Answer» BGP path selection is based on the values of the following attributes: |
|
| 3. |
What are the different types of attributes present in BGP? |
|
Answer» Following are the different types of attributes PRESENT in BGP:
|
|
| 4. |
What are the various BGP Neighbor Adjacency States? |
|
Answer» Before any routing information is transmitted, BGP establishes a neighbour adjacency with other routers, similar to OSPF (Open Shortest Path First) or EIGRP (Enhanced Interior Gateway routing Protocol). BGP, on the other hand, does not use broadcast or multicast for BGP neighbour discovery; instead, neighbours are manually configured and communicate over TCP/179. Two BGP systems will go through a succession of BGP Neighbor Adjacency States before becoming neighbours. They are as follows:
|
|
| 5. |
Is it possible to utilise BGP (Border Gateway Protocol) instead of any IGP (Interior Gateway Protocol)? |
|
Answer» No, we can't USE BGP instead of any IGP because BGP connects different AUTONOMOUS SYSTEMS, whereas IGP WORKS inside autonomous systems. |
|
| 6. |
What are the different types of Timers present in BGP? |
|
Answer» Following are the different types of Timers present in BGP :
|
|
| 7. |
In BGP, what is the order of preference? |
|
Answer» The ORDER of preference in BGP DIFFERS depending on WHETHER the attributes are used for inbound or outbound UPDATES. The following is the order of preference for inbound updates:
The following is the order of preference for outgoing updates:
|
|
| 8. |
Is authentication possible with BGP? If yes, explain how. |
|
Answer» Yes. MD5 authentication is supported by BGP. BGP allows neighbours to authenticate each other USING MD5 and a shared password. It is set up with the following command neighbour {ip-address | peer-group-name} password password in BGP router setup mode. When authentication is enabled, BGP verifies the source of each routing update and authenticates every TCP segment from its peer. Authentication is required by most ISPs for their EBGP peers. Peering works only if both routers have the same password and are configured for authentication. When a router has a password configured for a neighbour but the neighbour router does not, the console displays a message like this when the routers TRY to create a BGP session. %TCP-6-BADAUTH: No MD5 DIGEST from [peer's IP address]:11003 to [local router's IP address]:179Similarly, if the two routers are configured with different passwords, a message like this will appear on the screen: %TCP-6-BADAUTH: Invalid MD5 digest from [peer's IP address]:11004 to [local router's IP address]:179 |
|
| 9. |
What do you understand by peers in the context of BGP? What is the purpose of BGP peer groups? |
|
Answer» BGP peers are two routers that have established a link for exchanging BGP information. Such BGP peers provide routing information via TCP-based BGP SESSIONS, which are dependable, connection-oriented, and error-free protocols. The above image shows a BGP PEERING session between two BGP routers. We may UTILISE peer groups to simplify BGP configuration and REDUCE the amount of updates BGP has to produce. We can create a peer group with the neighbours and then APPLY all of our setups to it. |
|
| 10. |
What do you understand about poison reverse in the context of BGP? |
|
Answer» Poison Reverse: The Poison Reverse algorithm is a widely used distance-vector routing algorithm. To solve the count-to-infinity problem, poison reverse is used. To put it another way, poison reverse is the INVERSE of the split horizon. Route advertisements that would be muted by split horizon are instead ADVERTISED at a distance of infinity with poison reverse. Poison reverse is a RIP (Routing Information Protocol) technique. When path information becomes INVALID, routers do not instantly remove it from the routing database; instead, they broadcast a hop-count of 16, which is an unreachable metric value. This increases the size of the routing table but aids in the elimination of loops. It can break any loop between NEIGHBOURING routers right away. The MAIN notion of poison reverse is to ensure that a path does not return to the same node if the network's cost has changed. |
|
| 11. |
What do you understand about split horizon in the context of BGP? Explain with an example. |
|
Answer» Split Horizon: The split horizon is a method employed by distance vector protocols to prevent network routing LOOPS. The underlying premise is straightforward: NEVER send routing information back in the same direction it came from. It is necessary to have a split-horizon because distance vector protocols like Routing Information Protocol (RIP) are prone to routing loops, which occur when a data packet is caught in an unending loop and routed through the same routers over and over again. Split horizon is frequently used in protocols to avoid loops. Different strategies are used to prevent packet looping in other protocols, such as Open Shortest Path First. When split horizon is enabled, a router is prevented from advertising a route back to the router from whence it learnt it. To put it another way, if a router receives routing information from another router, the first router will not broadcast it back to the second router, preventing routing loops. Example: An example of three routers used to forward packets between networks is shown in the diagram below. The R3 router transmits routing information about the 10.0.0.0/16 network to the R2 router in this simple architecture. This information is received by the R2 router, which modifies its routing table and broadcasts it to the R1 router. The R1 router modifies its routing database when it receives this information. The modified routing information allows the R1 router to send packets to the 10.0.0.0/16 network VIA the R2 and R3 routers. The R1 router will not be able to advertise this network route back to the R2 router if a split horizon is enabled. If the R1 router does not have split-horizon enabled, it will broadcast the route to the R2 router, which will update its routing table to reflect the network route available through the R1 router. The presence of the R1 route in the R2 routing database is not an issue in TYPICAL operations because it is plainly a lot more expensive route than a direct R2-to-R3 connection. If the R2-to-R3 connection fails and the R2 router receives a packet from R1 destined for the 10.0.0.0/16 network, the R2 router will return the packet to R1 because the router advertised a functional network path. However, based on its own routing information, the R1 router will just return the packet to the R2 router, resulting in a routing loop that will continue until the packet dies. The R1 router will not advertise the network route to the R2 router if the split horizon is enabled, preventing the routing loop. |
|
| 12. |
Differentiate between internal Border Gateway Protocol (iBGP) and external Border Gateway Protocol (eBGP). |
||||||||||||||||||||
Answer»
The following table lists the differences between the internal Border Gateway Protocol and the external Border Gateway Protocol:
|
|||||||||||||||||||||
| 13. |
What do you understand by Routing Information Protocol (RIP) in the context of networking? |
|
Answer» The Routing Information Protocol (RIP) is a dynamic routing protocol that FINDS the optimum path between the source and DESTINATION networks by using hop count as a routing metric. It is a distance-vector routing protocol with an AD value of 120 that operates at the OSI application layer. The RIP protocol USES port 520. The number of routers between the source and destination networks is referred to as the hop count. The path with the fewest hops is deemed the best route to a network and is thus entered into the routing table. The number of hops allowed in a path between source and destination is limited by RIP, which eliminates routing loops. The maximum number of hops allowed by RIP is 15, and a hop count of 16 is considered unreachable by the network. Following are the features of Routing Information Protocol (RIP):
|
|
| 14. |
Is it possible to run two BGP processes on the same router? |
|
Answer» No, you can't have TWO BGP PROCESSES running on the same router. This is because BGP is an Exterior GATEWAY PROTOCOL. |
|
| 15. |
Is it possible for routers on different subnets to become BGP neighbours? |
|
Answer» BGP is frequently set up between two ROUTERS that are directly connected and belong to distinct AUTONOMOUS systems. BGP routers don't require their neighbours to be on the same subnet. Instead, they employ a TCP connection between the routers to send and RECEIVE BGP messages, allowing NEIGHBOURING routers to be on the same or distinct subnets. |
|
| 16. |
What port number is used by the border gateway protocol? |
|
Answer» The Border Gateway Protocol uses the TRANSMISSION CONTROL Protocol (TCP) port number 179. |
|
| 17. |
What are the characteristics of the Border Gateway Protocol (BGP)? |
|
Answer» Following are the characteristics of the Border Gateway Protocol:
|
|