Fast Re-Route in IP/MPLS networks using Ericsson s IP Operating System

Size: px
Start display at page:

Download "Fast Re-Route in IP/MPLS networks using Ericsson s IP Operating System"

Transcription

1 Fast Re-Route in IP/MPLS networks using s IP Operating System

2 Introduction: Today, Internet routers employ several routing protocols to exchange routes. As a router learns its potential routes, it builds a database of next-hops. For every possible destination prefix, the router uses this database to identify where to route a packet. This database is called the Forwarding Information Base (FIB) and is programmed in the line card. When a new link, router or shared risk link group (SRLG) is added, there is a time delay or up convergence, which takes place until the new connectivity information infiltrates the network. When a link, router or SRLG fails there is also a time delay, known as down convergence, which is present until information about the connectivity loss is disseminated throughout the network. Up convergence time delays are not as critical as the latency created during a down convergence. During a down convergence delay, packets in route towards the failed path are dropped. When a local link fails, a router notifies its neighbors, via Interior Gateway Protocols (IGP) and Border Gateway Protocols (BGP), re-computes new next-hops for all affected prefixes, and then installs those next-hops in the forwarding plane. Until the new next-hops are installed, traffic directed towards the affected prefixes is discarded. This process can take several seconds. The duration between a network failure event, and when all routers in that network update their forwarding hardware, is called convergence time. The process of routers updating next-hop information in their FIBs, to bypass a failure during network failure, is called Re-Routing. This paper provides an overview of how to achieve Fast Re-Route (FRR) functionality in a network by using s Internet Protocol Operating System (IP Operating System). You will gain an understanding of FRR, as well as how it enables large networks to recover from failure in sub second. Familiarity with Internet Protocols, Multi Protocol Label Switching (MPLS)/Label Distribution Protocol (LDP) and Virtual Private Networks (VPN) is essential to understanding the contents of this document. What is FRR? FRR is the ability of a router to support the following two functionalities: 1. Pre-calculating a backup route to destination prefixes in its next-hop database. This backup route is accessed via a backup next-hop and is activated when the primary route to a destination prefix goes down. When a router with a backup route to a prefix detects a connectivity failure to that prefix, to achieve convergence, it will exchange routing information for recalculation of a new next-hop. It then updates the FIB and the forwarding hardware. However, the advantage of pre-calculating a backup next-hop is that a router can successfully forward packets during convergence (i.e. before the new next-hop to the prefix has been calculated and the FIB has been updated) Prior to convergence, the network is in a transient state. As a result, different routers have different views of the network, which may cause them to calculate next-hops that are incompatible with the next-hop calculations of other routers in that network. This scenario creates the possibility of forwarding packets in a loop among two or more routers. Because the backup next-hops must ensure correct (but not necessarily optimal) forwarding in a nonconverged network, it is essential that any chosen backup next-hop prevents packets from being forwarded in a loop when other routers are using old next-hops, as well as when these routers start using new next-hops. Such a backup next-hop is called a loop free alternate (LFA) next-hop. To avoid forwarding loops during network convergence, all routers in the network must calculate LFA next-hops. 2. As soon as the failure of the primary route is detected, in the forwarding hardware, the router replaces the active next-hop to the failed destination prefix with a pre-calculated backup next-hop within tens of milliseconds. Routing protocols will download the pre-calculated backup next-hops, along with the primary next-hops in the forwarding hardware, so that the hardware is aware of the existence of backup next-hops. The hardware monitors adjacent links. When a link fails the primary next-hop to the unreachable prefixes is replaced with the backup nexthop for these prefixes. For non-adjacent links, the routing protocol in the control plane signals to the forwarding hardware that a destination prefix is down. At that time, the hardware replaces the primary next-hop with the backup next-hop. Since the update occurs in the hardware, it happens much faster than protocol convergence. A network built with routers that support FRR experiences less traffic loss and less micro-looping than non-frr networks. But achieving acceptable speed is a concern. Although a router s convergence time generally takes several seconds, new media applications that use voice and video are sensitive to traffic losses greater than tens of milliseconds. In order for next generation networks to support these applications, and provide 99999% reliability, these networks need to recover from failure in milliseconds. Position Paper: FRR in IP/MPLS Networks using 2

3 FRR in s IP Operating System: The FRR infrastructure in s IP Operating System is built using the following components: 1. Loop Free Alternate (LFA): Open Shortest Path First (OSPF), Intermediate System to Intermediate System (IS-IS), Label Distribution Protocol (LDP) and Resource Reservation Protocols (RSVP) support the calculation of LFA routes in s IP Operating System. In the topology shown in Figure 1, OSPF and IS-IS will calculate as the primary prefix P2 next-hop and as a backup next-hop to reach prefix P2 from P1. Similarly the LDP will use Label1 as the primary label and Label2 as a backup label to reach prefix P2 from P1. Both OSPF and IS-IS protocol implementations in the IP Operating System support per-prefix LFA as compared to per-link LFA. This ensures that networks using the IP Operating System have better node protection, better FRR topology coverage and better capacity utilization /Label2 R2/LSR R1/LSR /Label1 R4/LSR4 P2 P3 P4 1 2 R3/LSR3 Figure 1 LFA support for OSPF: In the IP Operating System, OSPF supports a per-prefix a LFA computation over a point-to-point OSPF interface that is configured for a LFA computation. If the point-to-point interface has a full neighbor adjacency, the LFA computation is performed for the entire area. By default, all point-to-point and broadcast interfaces can be used as LFA backups. LFA support for IS-IS: In the IP Operating System, IS-IS supports a per-prefix LFA computation over a point-to-point IS-IS interface configured for a LFA computation. IS-IS performs a L1 area/l2 domain LFA computation by executing a Shortest Path First (SPF) computation based on the standpoint of each eligible neighboring system. LFA support for LDP: In the IP Operating System, LDP functions in a liberal label retention mode to store next-hop labels corresponding to neighbors, which are not currently the primary neighbors, and in a downstream unsolicited mode to distribute the labels for the Forwarding Equivalence Class that are on other paths besides the Shortest Path Tree. The LDP LFA calculation follows the IGP protocols, via the Routing Information Base (RIB), for calculation of the backup next-hop. Position Paper: FRR in IP/MPLS Networks using 3

4 CLI/Configuration OSPF/ISIS/LDP/RSVP Routing Information Base will 1. Download primary next-hop calculated by the routing protocol Forwarding Information Base will store the primary and the back-up next-hop in the hardware The flow chart provides a logical view of a LFA implementation in the IP Operating System. IGPs will calculate primary and back-up next-hops. The RIB will download the primary and backup next-hops to the FIB, which in turn will program the next-hops in the hardware. 2. Fast local repair with protected Next Hops: Double Barrel Next-Hop (DBNH): The IGP/BGP/LDP protocols, that feed the prefix arrival information, provide a backup next-hop for the primary nexthop to the RIB, when executing a route add or update. The RIB will use the primary and backup information to create a double-barrel next-hop (DBNH). If there is an Equal Cost Multi Path (ECMP) of primary paths, then each primary path may optionally have a backup path. When a DBNH is downloaded to the line card, it will appear as a next-hop with two next-hop IDs - primary and backup. The line card holds on to this DBNH and downloads only the active part of the next-hop to the network processor for packet forwarding. When a line card receives a trigger, it will overwrite the active primary next-hop in the network processor, with the backup from the DBNH. The double barrel is also applicable to the Link State Protocol (LSP) paths in order for the LDP to compute and install an LFA backup path/label for a primary path/label. For the topology shown in Figure 1 a DBNH for an IGP protocol will look as follows: Prefix P1 uses a double barrel that contains a primary next-hop of and backup next-hop of Double Barrel Next-Hop Primary Next-Hop Backup Next-Hop is Primary Next-Hop is programmed in the Network Processor Position Paper: FRR in IP/MPLS Networks using 4

5 Similarly, DBNH for LDP will look as follows: Prefix P1 uses a double barrel that contains a primary next-hop of Label1 and backup next-hop of Label2 to get to P2 Double Barrel Next-Hop Primary Next-Hop Backup Next-Hop is Label 2 Primary next-hop Label1 is programmed in the Network Processor Double Label Next-Hop (DLNH): In LSP-based networks, egress Provider Edge (PE) routers need to be protected at the ingress PE. A labeled next-hop is a label acting as a next-hop to a Label Switching Router (LSR). A single pair of primary and backup labels (corresponding to primary and backup egress PE routers) can act as next-hop for thousands of external prefixes. In such a situation, a connectivity failure to the primary label requires a backup label update for thousands of prefixes in the line card, which can take up to several seconds. In the IP Operating System, this potential delay is avoided by the use of DLNHs. A DLNH is a next-hop that consists of two labels. Each of the two labels points to a DBNH. When the primary nexthop of the DBNH is active, the first label is used. When the backup is active the second label is used. In case of a failure, the advantage of a DLNH is that only a single mapping between the DLNH and DBNH needs to be updated. Advantages of DBNH and DLNH: 1. Since a DBNH and DLNH are programmed in the hardware, the switch from active next-hop to the back-up nexthops is achieved in about 50 milliseconds. 2. When link fails on an edge router that can reach several thousand prefixes using one next-hop, the router can reroute traffic to these prefixes with a single update to the next-hop database in the line card. 3. DBNHs and DLNHs are agnostic of the technology that notifies the link failure such as: Bidirectional Forwarding Detection, Fast Failure Notification, etc., and can be used with any underlying link failure detection mechanism. Consider a network, as shown in Figure 2, where PE routers LSR3 and LSR4 provide connectivity to a few thousand prefixes. LSR3 and LabelP14 allocate LabelP13 and LabelP23, and LabelP24 is allocated by LSR4. LabelP32 and LabelP42 are allocated by a customer edge LSR that is directly connected to these prefixes. LabelP32 and LabelP42 are allocated by another customer edge LSR that is directly connected to these prefixes. Label13 LabelP32 LSR1 Label14 LSR3 LabelP35 P2...P5000 P1 R1 Label23 LabelP42 LSR2 Label24 LSR4 LabelP45 P2...P5000 Figure 2 Position Paper: FRR in IP/MPLS Networks using 5

6 The DLNH in the FIB on LSR1 will look like: Double Label Next-Hop P2...P5000 P P10000 LabelP32 LabelP42 Double Label Next-Hop Label13 Label14 Label14 Label13 LabelP45 LabelP35 P2 P5000 prefixes are reachable through a DLNH containing labels LabelP32 and LabelP42. The DLNH in turn points to a DBNH of Label13 (from LSR3) and Label14 (from LSR4). When LSR3 is active, LabelP32 of DLNH is used to forward traffic. When the line card on LSR1 detects that connectivity to LSR3 is down, it switches the second label Label14 of the DBNH to active in the network processor, and from then on LabelP42 of DLNH is used to forward traffic. A similar explanation applies to prefixes P P10000 that use LSR4 as the primary next-hop. As a result, only a single update is required to update the next-hop for 5000 prefixes and, since this update is takes place in the hardware, it is executed in less than 50 milliseconds. 3. Triggers for Fast Re-Route: The IP Operating System has the ability to detect and propagate adjacent and remote link failures using proprietary Fast Failover Notification (FFN) and Event Tracking Infrastructure (ETI). FFN is a resilient infrastructure that detects link or router failures for critical services in milliseconds. FFN consists of a trigger mechanism, and an infrastructure to propagate the triggered event to all line cards, as well as several protocols on the control plane that depend on the FFN events to make re-routing decisions. The trigger could be events related to link or line card failure, Bidirectional Forwarding Detection (BFD) failure or keep alive failure. On the line card, a FNN event indicates that the primary next-hop is not reachable and triggers the line card to switch to the backup next-hop. In addition to FFN, ETI is used to trigger a switch from a primary to a backup next-hop. The IGP/BGP/LDP protocols store an ETI object ID in a DBNH. When the protocol detects that the next-hop is not reachable, the protocol signals the ETI infrastructure on the line card and the line card switches to the backup next-hop immediately. The IP Operating System provides the ability for multiple clients to use DBNHs, with the same primary or a backup pair by supporting different DBNHs for each client. An example of two clients needing the same double barrel, but different triggers, is the L2VPN and L3VPN that use the same PE routers as primary/backup. L2VPN routes are added by LDP, which may want control-plane driven triggering. L3VPN routes are added by BGP, which may want multi-hop BFD as a trigger. 4. Remote Loop Free Alternate (LFA): A LFA cannot provide protection in ring topologies as the one shown in the figure. LDP tunnel from R6 to R3 provide access from R6 to P1 P1 R3 R1 R6-R2-R1 is the primary path from R6 to P1 R2 X R4 R6 R5 Figure 3 Position Paper: FRR in IP/MPLS Networks using 6

7 In the topology shown in Figure 3, when all links are active, R6 sends traffic to P1 via R2 and R1. If the link between R6 and R2 breaks, R6 is not able to send traffic to P1 via R5, since R5 also uses R6 to send traffic to P1. The connectivity from R6 to R1 is restored in s IP Operating System by using remote a LFA. With remote a LFA, R6 is able to dynamically identify R3 as its remote LFA node and sets up a directed Label Distribution Protocol (LDP) session with R3. Then R6 uses this LDP session with R3 to send traffic for P1 and thus connectivity to P1 from R6 is restored. The LDP session between the two routers, as well as the related label processing, does not require any prior path provisioning. 5. IP FRR on s Smart Services Router Smart Services Router (SSR) developed using the IP Operating System is s flag ship routing and services platform. The SSR leverages the IP FRR functionality in the IP Operating System with the help of high density line cards that support the DBNH and DLNH along with ETI and FFN, and is well positioned to help operators achieve network convergence in sub second. 6. Use Cases for FRR in IP/MPLS networks: Static IPFRR with BFD: /32 R / / /32 R / /32 R /32 Figure 4 In the topology shown in Figure 4, the next-hop static routes are protected from failure using a DBNH. The BFD can be used to monitor the failure of a primary next-hop, and when failure is detected, the line card switches to existing a backup next-hop in a few milliseconds. R1 has a static route to /32 via primary next-hop and backup next-hop The FIB has a DBNH (with and ) for /32. Single session BFD is used to monitor connectivity to When connectivity loss to is detected, line card switches the backup next-hop to active. Position Paper: FRR in IP/MPLS Networks using 7

8 IGP FRR with BFD: /32 R / / /32 R / /32 R /32 Figure 5 In the topology shown in Figure 5, a next-hop of IGP protocols such as the OSPF and IS-IS are protected using a DBNH calculated by LFA. R1 has an IGP route to /32 via primary next-hop and a backup next-hop , computed through the LFA. The FIB has a DBNH (with and ) for /32. Single session BFD is used to monitor connectivity to When connectivity loss to is detected, the line card switches the backup next-hop to active. IPFRR in redundancy solutions with MC-LAG/VRRP: In the IP Operating System, FRR is used in redundancy solutions based on Multi Chassis (MC) LAG/Virtual Router Redundancy Protocol (VRRP) to re-route traffic through a backup Inter Chassis Redundancy (ICR) link when the active link goes down. H1 Redundancy with MC LAG/VRRP R1 L2 Network L2 L3 Network R2 H2 Figure 6 Position Paper: FRR in IP/MPLS Networks using 8

9 In the topology shown in Figure 6, router R1 has an active link to the L2 network and is the primary path for traffic from the L3 network to the L2 network. The link from R2 to the L2 network serves as the backup link to connect the L3 network to the L2 network. The link from the R2 to L3 network has a higher metric then the link from R1 to the L3 network and, as a result, the traffic from the L3 network flows to R1. R2 is also connected to R1 through an ICR link, which serves as a backup for traffic from the L3 network to the L2 network. Therefore, R1 has a DBNH via the ICR link to R2. When the primary link on R1 to the L2 network goes down, not only does the link on R2 to the L2 network become active, the line card on R1 activates the backup next-hop to R2 and traffic from the L3 network is rerouted to the L2 network through R2 in less than 50 milliseconds. As a result, FRR allows a fast recovery from link failure. BGP FRR using BGP Best External: The IP Operating System-based MPLS VPN networks are able to converge in milliseconds using the Best External feature in BGP. Primary PE router PER3 has route to PER1 and PER2 through BGP Best External PER1 CER2 PER3 MPLS VPN Network CER1 Customer Network PER2 Primary PE router Figure 7 In the MPLS VPN network shown above, both PE routers PER1 and PER2 are connected to the customer edge router CER1. The network is setup so that PE1 has a higher local preference. The traffic on the customer edge network exits the MPLS VPN network through PER1 to reach CER1. Since both PER1 and PER2 are connected to CER1, when the BGP Best External is enabled on PER1 and PER2, the BGP protocol calculates the backup best external path to CER1 through PER2 and advertises this path to PER3. As a result, the FIB on PER3 has a DBNH with PER1 as an active nexthop and PER2 as a backup next-hop. When PER3 detects a loss of connectivity to PER1, the line card immediately switches the backup next-hop of PER2 to active and traffic to CER1 is rerouted via PER2 in less than 50 milliseconds. Fast Re-Route in IP/MPLS networks using s IP Operating System BGP FRR using BGP Path Diversity: The IP Operating System-based BGP networks are able to converge in milliseconds using the Path Diversity feature on BGP Route Reflectors. PE RR Primary PE router PER1 PER4 Route Reflector has diverse session with peer PER4 CER1 Customer Network Figure 8 PER2 Primary PE router Position Paper: FRR in IP/MPLS Networks using 9

10 In the BGP network shown above, the Route Reflector learns the best path to CER1 through PER1, as well as the backup path through PER2 due to the BGP Best External. However, the route reflector only mirrors the best path through PER1 to its client PER4. When BGP Path Diversity is enabled, the Route Reflector has another diverse session with its client PER4 and in turn also displays the backup path through PER2 to PER4. Therefore, PER4 knows the best path and backup path to reach CER1. The FIB on PER4 has a DBNH for CER1 with PER1 as an active next-hop, and PER2 as backup next-hop. When PER4 detects a loss of connectivity to PER2, the line card immediately switches the backup next-hop of PER2 to active and traffic to CER1 is re-routed via PER2 in < 50 milliseconds. 6. IPFRR LFA Analyzer: also provides a network optimization tool called IPFRR LFA Analyzer for improving the IPFRR coverage with LFA. This tool, which costs much less than existing commercial tools, can help to determine if the network coverage can be improved by adding a new link with a higher cost or modify existing link costs to maximize the number of protected failure scenarios. A user friendly GUI allows operators to create their networks and assign costs to the links. Using this tool, operators can improve the performance of their existing networks by 10-40% by adding a few new links and achieve close to perfect LFA coverage via cost optimization. Conclusions: By developing an infrastructure based on LFAs and protected next-hops, the IP Operating System is able to detect and re-route traffic in less than 50 milliseconds from the event of failure. Independent of the number of prefixes that are reachable from an edge router, the DBNH and DLNH provide the ability to re-route traffic in sub second. Routers running s IP Operating System are able to take advantage of cutting edge FRR infrastructure to detect network failure and re-route traffic in milliseconds. These routers are able to minimize traffic loss during failure and recover from it without causing noticeable service degradation. As a result, s IP Operating System enables networks that are more scalable and have a lower downtime. About : is a world-leading provider of communications technology and services. We are enabling a networked society with efficient real-time solutions that will allow 60 billion people to study, work and live more freely in sustainable societies around the world. Our offering comprises services, software and infrastructure within Information and communications technology for telecom operators and other industries. Today 40 percent of the world s mobile traffic goes through networks and we support customer networks servicing more than 2.5 billion subscriptions. Please visit us at Position Paper: FRR in IP/MPLS Networks using 10

11 appendix Acronym BGP: Border Gateway Protocol BFD: Bidirectional Forwarding Detection CE: Customer Edge DBNH: Double Barrel Next-Hop DLNH: Double Label Next-Hop ECMP: Equal Cost Multi Path ETI: Event Tracking Infrastructure FIB: Forwarding Information Base FRR: Fast ReRoute FFN: Fast Failover Notification IP OPERATING SYSTEM: Internet Protocol Operating System IGP: Interior Gateway Protocol ICR: Inter Chassis Redundancy LDP: Label Distribution Protocol LFA: Loop Free Alternate IS-IS: Intermediate System to Intermediate System LSP: Link State Protocol LSR: Label Switching Router MPLS: Multi Protocol Label Switching MC: Multi Chassis OSPF: Open Shortest Path First PE: Provider Edge RIB: Routing Information Base RSVP: Resource Reservation Protocols SRLG: Shared Risk Link Group VRRP: Virtual Router Redundancy Protocol VPN: Virtual Private Network Inc. 200 Holger Way San Jose, CA Phone: (EUS) Jan / FGB Uen Rev A Specifications subject to change without notice. Position Paper: FRR in IP/MPLS Networks using 11

Fast Reroute for Triple Play Networks

Fast Reroute for Triple Play Networks Building Smart Broadband Networks TM Fast Reroute for Triple Play Networks Sachin Natu Product Management March 2006 IPTV Service Requirements IPTV Network Design Fast Reroute / Convergence Solutions -

More information

ENSURING RAPID RESTORATION IN JUNOS OS-BASED NETWORKS

ENSURING RAPID RESTORATION IN JUNOS OS-BASED NETWORKS WHITE PAPER ENSURING RAPID RESTORATION IN JUNOS OS-BASED NETWORKS A Complete Convergence Solution Based on Local Repair, Loop Free Alternates, and Hierarchical Forwarding Copyright 0, Juniper Networks,

More information

Multi Protocol Label Switching (MPLS) is a core networking technology that

Multi Protocol Label Switching (MPLS) is a core networking technology that MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of

More information

Fast Reroute Techniques in MPLS Networks. George Swallow [email protected]

Fast Reroute Techniques in MPLS Networks. George Swallow swallow@cisco.com Fast Reroute Techniques in MPLS Networks George Swallow [email protected] Agenda What are your requirements? The solution space U-turns Traffic Engineering for LDP Traffic Engineering Some Observations

More information

Introducing Basic MPLS Concepts

Introducing Basic MPLS Concepts Module 1-1 Introducing Basic MPLS Concepts 2004 Cisco Systems, Inc. All rights reserved. 1-1 Drawbacks of Traditional IP Routing Routing protocols are used to distribute Layer 3 routing information. Forwarding

More information

BFD. (Bidirectional Forwarding Detection) Does it work and is it worth it? Tom Scholl, AT&T Labs NANOG 45

BFD. (Bidirectional Forwarding Detection) Does it work and is it worth it? Tom Scholl, AT&T Labs NANOG 45 BFD (Bidirectional Forwarding Detection) Does it work and is it worth it? Tom Scholl, AT&T Labs NANOG 45 What is BFD? BFD provides a method to validate the operation of the forwarding plane between two

More information

MPLS Basics. For details about MPLS architecture, refer to RFC 3031 Multiprotocol Label Switching Architecture.

MPLS Basics. For details about MPLS architecture, refer to RFC 3031 Multiprotocol Label Switching Architecture. Multiprotocol Label Switching (), originating in IPv4, was initially proposed to improve forwarding speed. Its core technology can be extended to multiple network protocols, such as IPv6, Internet Packet

More information

WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr. 2006 Cisco Systems, Inc. All rights reserved.

WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr. 2006 Cisco Systems, Inc. All rights reserved. MPLS WAN Topologies 1 Multiprotocol Label Switching (MPLS) IETF standard, RFC3031 Basic idea was to combine IP routing protocols with a forwarding algoritm based on a header with fixed length label instead

More information

Cisco Configuring Basic MPLS Using OSPF

Cisco Configuring Basic MPLS Using OSPF Table of Contents Configuring Basic MPLS Using OSPF...1 Introduction...1 Mechanism...1 Hardware and Software Versions...2 Network Diagram...2 Configurations...2 Quick Configuration Guide...2 Configuration

More information

BGP Best Path Selection Algorithm

BGP Best Path Selection Algorithm BGP Best Path Selection Algorithm Document ID: 13753 Contents Introduction Prerequisites Requirements Components Used Conventions Why Routers Ignore Paths How the Best Path Algorithm Works Example: BGP

More information

Router and Routing Basics

Router and Routing Basics Router and Routing Basics Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Routing Protocols and Concepts CCNA2 Routing and packet forwarding Static routing Dynamic

More information

Loop-Free IP Fast Reroute Using Local and Remote LFAPs

Loop-Free IP Fast Reroute Using Local and Remote LFAPs Loop-Free IP Fast Reroute Using Local and Remote LFAPs I. Hokelek, M. A. Fecko, P. Gurung, S. Samtani Contact: Ibrahim Hokelek Applied Research Telcordia Technologies Inc. [email protected]

More information

Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang [email protected] AT&T

Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang luyuanfang@att.com AT&T Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang [email protected] AT&T 1 Outline! BGP/MPLS VPN (RFC 2547bis)! Setting up LSP for VPN - Design Alternative Studies! Interworking of LDP / RSVP

More information

Fast Reroute with Segment Routing

Fast Reroute with Segment Routing TEHNOLOGY WHITE PPER Extending Fast Reroute coverage in LDP-based MPLS networks Segment Routing (SR) is an emerging technology for IP/Multiprotocol Label Switching (MPLS) networks that enables source routing.

More information

How To Make A Network Secure

How To Make A Network Secure 1 2 3 4 -Lower yellow line is graduate student enrollment -Red line is undergradate enrollment -Green line is total enrollment -2008 numbers are projected to be near 20,000 (on-campus) not including distance

More information

MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans

MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans Contents Overview 1 1. L2 VPN Padding Verification Test 1 1.1 Objective 1 1.2 Setup 1 1.3 Input Parameters 2 1.4 Methodology 2 1.5

More information

Using OSPF in an MPLS VPN Environment

Using OSPF in an MPLS VPN Environment Using OSPF in an MPLS VPN Environment Overview This module introduces the interaction between multi-protocol Border Gateway Protocol (MP-BGP) running between Provider Edge routers (s) and Open Shortest

More information

Enterprise Network Simulation Using MPLS- BGP

Enterprise Network Simulation Using MPLS- BGP Enterprise Network Simulation Using MPLS- BGP Tina Satra 1 and Smita Jangale 2 1 Department of Computer Engineering, SAKEC, Chembur, Mumbai-88, India [email protected] 2 Department of Information Technolgy,

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

IMPLEMENTING CISCO MPLS V3.0 (MPLS)

IMPLEMENTING CISCO MPLS V3.0 (MPLS) IMPLEMENTING CISCO MPLS V3.0 (MPLS) COURSE OVERVIEW: Multiprotocol Label Switching integrates the performance and traffic-management capabilities of data link Layer 2 with the scalability and flexibility

More information

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007 Multihoming and Multi-path Routing CS 7260 Nick Feamster January 29. 2007 Today s Topic IP-Based Multihoming What is it? What problem is it solving? (Why multihome?) How is it implemented today (in IP)?

More information

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification

More information

MPLS is the enabling technology for the New Broadband (IP) Public Network

MPLS is the enabling technology for the New Broadband (IP) Public Network From the MPLS Forum Multi-Protocol Switching (MPLS) An Overview Mario BALI Turin Polytechnic [email protected] www.polito.it/~baldi MPLS is the enabling technology for the New Broadband (IP) Public

More information

HP Networking BGP and MPLS technology training

HP Networking BGP and MPLS technology training Course overview HP Networking BGP and MPLS technology training (HL046_00429577) The HP Networking BGP and MPLS technology training provides networking professionals the knowledge necessary for designing,

More information

Multi-Protocol Label Switching To Support Quality of Service Needs

Multi-Protocol Label Switching To Support Quality of Service Needs Technical Report, IDE1008, February 2010 Multi-Protocol Label Switching To Support Quality of Service Needs Master s Thesis in Computer Network Engineering - 15hp AMJAD IFTIKHAR AOON MUHAMMAD SHAH & FOWAD

More information

MPLS/BGP Network Simulation Techniques for Business Enterprise Networks

MPLS/BGP Network Simulation Techniques for Business Enterprise Networks MPLS/BGP Network Simulation Techniques for Business Enterprise Networks Nagaselvam M Computer Science and Engineering, Nehru Institute of Technology, Coimbatore, Abstract Business Enterprises used VSAT

More information

Kingston University London

Kingston University London Kingston University London Thesis Title Implementation and performance evaluation of WAN services over MPLS Layer-3 VPN Dissertation submitted for the Degree of Master of Science in Networking and Data

More information

Traffic Engineering Management Concepts

Traffic Engineering Management Concepts 3 CHAPTER This chapter includes an overview of Cisco Prime Fulfillment and of some of the concepts used in this guide. This chapter includes the following sections: Prime Fulfillment TEM Overview, page

More information

NAVAL POSTGRADUATE SCHOOL THESIS

NAVAL POSTGRADUATE SCHOOL THESIS NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS A PERFORMANCE ANALYSIS OF BGP/MPLS VPN FAILOVER FUNCTIONALITY by Guan Chye Tan December 2006 Thesis Advisor: Second Reader: Geoffrey Xie John Gibson

More information

MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009

MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009 MikroTik RouterOS Introduction to MPLS Prague MUM Czech Republic 2009 Q : W h y h a v e n 't y o u h e a r d a b o u t M P LS b e fo re? A: Probably because of the availability and/or price range Q : W

More information

MPLS Traffic Engineering in ISP Network

MPLS Traffic Engineering in ISP Network MPLS Traffic Engineering in ISP Network Mohsin Khan Birmingham City University, England ABSTRACT Multi Protocol Label Switching (MPLS) is an innovative and vibrant technology. The most famous applications

More information

Introduction to HA Technologies: SSO/NSF with GR and/or NSR. Ken Weissner / [email protected] Systems and Technology Architecture, Cisco Systems

Introduction to HA Technologies: SSO/NSF with GR and/or NSR. Ken Weissner / kweissne@cisco.com Systems and Technology Architecture, Cisco Systems Introduction to HA Technologies: SSO/NSF with GR and/or NSR. Ken Weissner / [email protected] Systems and Technology Architecture, Cisco Systems 1 That s a lot of acronyms Some definitions HA - High Availability

More information

Network Virtualization with the Cisco Catalyst 6500/6800 Supervisor Engine 2T

Network Virtualization with the Cisco Catalyst 6500/6800 Supervisor Engine 2T White Paper Network Virtualization with the Cisco Catalyst 6500/6800 Supervisor Engine 2T Introduction Network virtualization is a cost-efficient way to provide traffic separation. A virtualized network

More information

Broadband Networks. Prof. Karandikar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture - 26

Broadband Networks. Prof. Karandikar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture - 26 Broadband Networks Prof. Karandikar Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 26 Optical Network &MPLS So, as you were discussing in the previous lectures, next

More information

MPLS Concepts. Overview. Objectives

MPLS Concepts. Overview. Objectives MPLS Concepts Overview This module explains the features of Multi-protocol Label Switching (MPLS) compared to traditional ATM and hop-by-hop IP routing. MPLS concepts and terminology as well as MPLS label

More information

Understanding Virtual Router and Virtual Systems

Understanding Virtual Router and Virtual Systems Understanding Virtual Router and Virtual Systems PAN- OS 6.0 Humair Ali Professional Services Content Table of Contents VIRTUAL ROUTER... 5 CONNECTED... 8 STATIC ROUTING... 9 OSPF... 11 BGP... 17 IMPORT

More information

Department of Communications and Networking. S-38.2131/3133 Networking Technology, Laboratory course A/B

Department of Communications and Networking. S-38.2131/3133 Networking Technology, Laboratory course A/B Department of Communications and Networking S-38.2131/3133 Networking Technology, Laboratory course A/B Work Number 38: MPLS-VPN Basics Student Edition Preliminary Exercises and Laboratory Assignments

More information

GregSowell.com. Mikrotik Routing

GregSowell.com. Mikrotik Routing Mikrotik Routing Static Dynamic Routing To Be Discussed RIP Quick Discussion OSPF BGP What is Routing Wikipedia has a very lengthy explanation http://en.wikipedia.org/wiki/routing In the context of this

More information

MPLS - A Choice of Signaling Protocol

MPLS - A Choice of Signaling Protocol www.ijcsi.org 289 MPLS - A Choice of Signaling Protocol Muhammad Asif 1, Zahid Farid 2, Muhammad Lal 3, Junaid Qayyum 4 1 Department of Information Technology and Media (ITM), Mid Sweden University Sundsvall

More information

Real-Time Traffic Engineering Management With Route Analytics

Real-Time Traffic Engineering Management With Route Analytics Real-Time Traffic Engineering Management With Route Analytics Executive Summary Increasing numbers of service providers and mobile operators are using RSVP-TE based traffic engineering to provide bandwidth

More information

Protection Methods in Traffic Engineering MPLS Networks

Protection Methods in Traffic Engineering MPLS Networks Peter Njogu Kimani Protection Methods in Traffic Engineering MPLS Networks Helsinki Metropolia University of Applied Sciences Bachelor of Engineering Information technology Thesis 16 th May 2013 Abstract

More information

MPLS-based Layer 3 VPNs

MPLS-based Layer 3 VPNs MPLS-based Layer 3 VPNs Overall objective The purpose of this lab is to study Layer 3 Virtual Private Networks (L3VPNs) created using MPLS and BGP. A VPN is an extension of a private network that uses

More information

How To Understand The Benefits Of An Mpls Network

How To Understand The Benefits Of An Mpls Network NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 Introduction MPLS in the Enterprise Multi-Protocol Label Switching (MPLS) as a technology has been around for over a decade

More information

Multiprotocol Label Switching (MPLS)

Multiprotocol Label Switching (MPLS) Multiprotocol Label Switching (MPLS) รศ.ดร. อน นต ผลเพ ม Asso. Prof. Anan Phonphoem, Ph.D. [email protected] http://www.cpe.ku.ac.th/~anan Computer Engineering Department Kasetsart University, Bangkok, Thailand

More information

Layer 3 Routing User s Manual

Layer 3 Routing User s Manual User s Manual Second Edition, July 2011 www.moxa.com/product 2011 Moxa Inc. All rights reserved. User s Manual The software described in this manual is furnished under a license agreement and may be used

More information

Routing with OSPF. Introduction

Routing with OSPF. Introduction Routing with OSPF Introduction The capabilities of an internet are largely determined by its routing protocol. An internet's scalability, its ability to quickly route around failures, and the consumption

More information

Chapter 4. Distance Vector Routing Protocols

Chapter 4. Distance Vector Routing Protocols Chapter 4 Distance Vector Routing Protocols CCNA2-1 Chapter 4 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario.

More information

Juniper Networks NorthStar Controller

Juniper Networks NorthStar Controller Juniper Networks NorthStar Controller Functionality Test Report Introduction IP/MPLS has been the technology of choice for service providers for the better part of a decade and a half. Backbone network

More information

How To Fix Bg Convergence On A Network With A Bg-Pic On A Bgi On A Pipo On A 2G Network

How To Fix Bg Convergence On A Network With A Bg-Pic On A Bgi On A Pipo On A 2G Network 1 BGP Prefix Independent Convergence draft-rtgwg-bgp-pic-00 Authors :, Cisco Systems Presenter : Clarence Filsfils, Cisco Systems Pradosh Mohapatra, Cisco Systems IETF85, Nov/2012 Atlanta, USA 2 Agenda

More information

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS Computer Network Architectures and Multimedia Guy Leduc Chapter 2 MPLS networks Chapter based on Section 5.5 of Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley,

More information

How Routers Forward Packets

How Routers Forward Packets Autumn 2010 [email protected] MULTIPROTOCOL LABEL SWITCHING (MPLS) AND MPLS VPNS How Routers Forward Packets Process switching Hardly ever used today Router lookinginside the packet, at the ipaddress,

More information

MPLS WAN Explorer. Enterprise Network Management Visibility through the MPLS VPN Cloud

MPLS WAN Explorer. Enterprise Network Management Visibility through the MPLS VPN Cloud MPLS WAN Explorer Enterprise Network Management Visibility through the MPLS VPN Cloud Executive Summary Increasing numbers of enterprises are outsourcing their backbone WAN routing to MPLS VPN service

More information

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Multiprotocol Label Switching Layer 3 Virtual Private Networks with Open ShortestPath First protocol PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Abstract This paper aims at implementing

More information

IPv6 over IPv4/MPLS Networks: The 6PE approach

IPv6 over IPv4/MPLS Networks: The 6PE approach IPv6 over IPv4/MPLS Networks: The 6PE approach Athanassios Liakopoulos Network Operation & Support Manager ([email protected]) Greek Research & Technology Network (GRNET) III Global IPv6 Summit Moscow, 25

More information

IxNetwork TM MPLS-TP Emulation

IxNetwork TM MPLS-TP Emulation IxNetwork TM MPLS-TP Emulation Test the Functionality, Performance, and Scalability of an MPLS-TP Ingress, Egress, or Transit Node MPLS has come a long way since its original goal to allow core routers

More information

Configuring a Load-Balancing Scheme

Configuring a Load-Balancing Scheme Configuring a Load-Balancing Scheme Last Updated: October 5, 2011 This module contains information about Cisco Express Forwarding and describes the tasks for configuring a load-balancing scheme for Cisco

More information

Lecture 8: Routing I Distance-vector Algorithms. CSE 123: Computer Networks Stefan Savage

Lecture 8: Routing I Distance-vector Algorithms. CSE 123: Computer Networks Stefan Savage Lecture 8: Routing I Distance-vector Algorithms CSE 3: Computer Networks Stefan Savage This class New topic: routing How do I get there from here? Overview Routing overview Intra vs. Inter-domain routing

More information

MPLS over IP-Tunnels. Mark Townsley Distinguished Engineer. 21 February 2005

MPLS over IP-Tunnels. Mark Townsley Distinguished Engineer. 21 February 2005 MPLS over IP-Tunnels Mark Townsley Distinguished Engineer 21 February 2005 1 MPLS over IP The Basic Idea MPLS Tunnel Label Exp S TTL MPLS VPN Label Exp S TTL MPLS Payload (L3VPN, PWE3, etc) MPLS Tunnel

More information

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service Nowdays, most network engineers/specialists consider MPLS (MultiProtocol Label Switching) one of the most promising transport technologies. Then, what is MPLS? Multi Protocol Label Switching (MPLS) is

More information

Leveraging Advanced Load Sharing for Scaling Capacity to 100 Gbps and Beyond

Leveraging Advanced Load Sharing for Scaling Capacity to 100 Gbps and Beyond Leveraging Advanced Load Sharing for Scaling Capacity to 100 Gbps and Beyond Ananda Rajagopal Product Line Manager Service Provider Solutions Foundry Networks [email protected] Agenda 2 Why Load

More information

Disaster-Resilient Backbone and Access Networks

Disaster-Resilient Backbone and Access Networks The Workshop on Establishing Resilient Life-Space in the Cyber-Physical Integrated Society, March. 17, 2015, Sendai, Japan Disaster-Resilient Backbone and Access Networks Shigeki Yamada ([email protected])

More information

MPLS TE Technology Overview

MPLS TE Technology Overview C H A P T E R MPLS TE Technology Overview In this chapter, you review the following topics: MPLS TE Introduction Basic Operation of MPLS TE DiffServ-Aware Traffic Engineering Fast Reroute This chapter

More information

MPLS Pseudowire Innovations: The Next Phase Technology for Today s Service Providers

MPLS Pseudowire Innovations: The Next Phase Technology for Today s Service Providers MPLS Innovations: The Next Phase Technology for Today s Service Providers Introduction MPLS technology enables a smooth evolution of core networks within today s service provider infrastructures. In particular,

More information

MPLS VPN Route Target Rewrite

MPLS VPN Route Target Rewrite The feature allows the replacement of route targets on incoming and outgoing Border Gateway Protocol (BGP) updates Typically, Autonomous System Border Routers (ASBRs) perform the replacement of route targets

More information

Demonstrating the high performance and feature richness of the compact MX Series

Demonstrating the high performance and feature richness of the compact MX Series WHITE PAPER Midrange MX Series 3D Universal Edge Routers Evaluation Report Demonstrating the high performance and feature richness of the compact MX Series Copyright 2011, Juniper Networks, Inc. 1 Table

More information

Junos MPLS and VPNs (JMV)

Junos MPLS and VPNs (JMV) Junos MPLS and VPNs (JMV) Course No: EDU-JUN-JMV Length: Five days Onsite Price: $32500 for up to 12 students Public Enrollment Price: $3500/student Course Level JMV is an advanced-level course. Prerequisites

More information

DD2491 p1 2008. Load balancing BGP. Johan Nicklasson KTHNOC/NADA

DD2491 p1 2008. Load balancing BGP. Johan Nicklasson KTHNOC/NADA DD2491 p1 2008 Load balancing BGP Johan Nicklasson KTHNOC/NADA Dual home When do you need to be dual homed? How should you be dual homed? Same provider. Different providers. What do you need to have in

More information

Exterior Gateway Protocols (BGP)

Exterior Gateway Protocols (BGP) Exterior Gateway Protocols (BGP) Internet Structure Large ISP Large ISP Stub Dial-Up ISP Small ISP Stub Stub Stub Autonomous Systems (AS) Internet is not a single network! The Internet is a collection

More information

Virtual Subnet: A Scalable Cloud Data Center Interconnect Solution

Virtual Subnet: A Scalable Cloud Data Center Interconnect Solution Virtual Subnet: A Scalable Cloud Data Center Interconnect Solution draft-xu-virtual-subnet-06 Xiaohu Xu ([email protected]) IETF82, TAIWAN Why VM Mobility across Data Centers Data center maintenance Applications

More information

MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre

MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre The feature overcomes the requirement that a carrier support multiprotocol label switching (MPLS) by allowing you to provide MPLS connectivity between networks that are connected by IP-only networks. This

More information

Juniper / Cisco Interoperability Tests. August 2014

Juniper / Cisco Interoperability Tests. August 2014 Juniper / Cisco Interoperability Tests August 2014 Executive Summary Juniper Networks commissioned Network Test to assess interoperability, with an emphasis on data center connectivity, between Juniper

More information

TechBrief Introduction

TechBrief Introduction TechBrief Introduction Leveraging Redundancy to Build Fault-Tolerant Networks The high demands of e-commerce and Internet applications have required networks to exhibit the same reliability as the public

More information

- Multiprotocol Label Switching -

- Multiprotocol Label Switching - 1 - Multiprotocol Label Switching - Multiprotocol Label Switching Multiprotocol Label Switching (MPLS) is a Layer-2 switching technology. MPLS-enabled routers apply numerical labels to packets, and can

More information

EVOLVING TO END-TO-END MPLS ARCHITECTURES Alcatel-Lucent Enables Seamless,

EVOLVING TO END-TO-END MPLS ARCHITECTURES Alcatel-Lucent Enables Seamless, EVOLVING TO END-TO-END MPLS ARCHITECTURES Alcatel-Lucent Enables Seamless, Scalable, Resilient MPLS Networks TECHNICAL White Paper Increasing demand for video content, Mobile broadband and Cloud services

More information

KT The Value Networking Company

KT The Value Networking Company KT The Value Networking Company IRIMS (Internet Routing Information Management System) 2005. 9 Y.D. KIM, G.E.KIM, C.K.Hwang, J.H.YOO (webman, gekim, ckhwang, styoo@kt kt.co..co.kr) Abstract An AS (Autonomous

More information

Configuring a Load-Balancing Scheme

Configuring a Load-Balancing Scheme Configuring a Load-Balancing Scheme Finding Feature Information Configuring a Load-Balancing Scheme Last Updated: August 15, 2011 This module contains information about Cisco Express Forwarding and describes

More information

Exercise 4 MPLS router configuration

Exercise 4 MPLS router configuration Exercise 4 MPLS router configuration Computer Network Technologies and Services (CNTS) Tecnologie e Servizi di Rete (TSR) Preliminary note For this exercise you have to use the virtual routing laboratory.

More information

TRILL for Data Center Networks

TRILL for Data Center Networks 24.05.13 TRILL for Data Center Networks www.huawei.com enterprise.huawei.com Davis Wu Deputy Director of Switzerland Enterprise Group E-mail: [email protected] Tel: 0041-798658759 Agenda 1 TRILL Overview

More information

Project Report on Traffic Engineering and QoS with MPLS and its applications

Project Report on Traffic Engineering and QoS with MPLS and its applications Project Report on Traffic Engineering and QoS with MPLS and its applications Brief Overview Multiprotocol Label Switching (MPLS) is an Internet based technology that uses short, fixed-length labels to

More information

100Gigabit and Beyond: Increasing Capacity in IP/MPLS Networks Today Rahul Vir Product Line Manager Foundry Networks rvir@foundrynet.

100Gigabit and Beyond: Increasing Capacity in IP/MPLS Networks Today Rahul Vir Product Line Manager Foundry Networks rvir@foundrynet. 100Gigabit and Beyond: Increasing Capacity in IP/MPLS Networks Today Rahul Vir Product Line Manager Foundry Networks [email protected] 1 Agenda 2 40GE/100GE Timeline to Standardization The Ethernet Alliance

More information

ETHERNET VPN (EVPN) NEXT-GENERATION VPN FOR ETHERNET SERVICES

ETHERNET VPN (EVPN) NEXT-GENERATION VPN FOR ETHERNET SERVICES ETHERNET VPN (EVPN) NEXT-GENERATION VPN FOR ETHERNET SERVICES Alastair JOHNSON (AJ) February 2014 [email protected] AGENDA 1. EVPN Background and Motivation 2. EVPN Operations 3. EVPN

More information

IP/MPLS-Based VPNs Layer-3 vs. Layer-2

IP/MPLS-Based VPNs Layer-3 vs. Layer-2 Table of Contents 1. Objective... 3 2. Target Audience... 3 3. Pre-Requisites... 3 4. Introduction...3 5. MPLS Layer-3 VPNs... 4 6. MPLS Layer-2 VPNs... 7 6.1. Point-to-Point Connectivity... 8 6.2. Multi-Point

More information

VPLS Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-10-30

VPLS Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-10-30 Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of

More information

Frame Mode MPLS Implementation

Frame Mode MPLS Implementation CHAPTER 4 Frame Mode MPLS Implementation Lab 4-1: Configuring Frame Mode MPLS (4.5.1) In this lab, you learn how to do the following: Configure EIGRP on a router. Configure LDP on a router. Change the

More information

Redundancy & the Netnod Internet Exchange Points

Redundancy & the Netnod Internet Exchange Points Redundancy & the Netnod Internet Exchange Points The extent to which businesses and consumers use the Internet for critical communication has been recognised for over a decade. Since the rise of the commercial

More information

Migrating to MPLS Technology and Applications

Migrating to MPLS Technology and Applications Migrating to MPLS Technology and Applications Serge-Paul Carrasco June 2003 asiliconvalleyinsider.com Table Of Content Why to migrate to MPLS? Congestion on the Internet Traffic Engineering MPLS Fundamentals

More information

Protection And Restoration In MPLS Networks

Protection And Restoration In MPLS Networks Protection And Restoration In MPLS Networks An examination of the methods for protecting MPLS LSPs against failures of network resources Ed Harrison, [email protected] Ben Miller, [email protected] Adrian

More information

Distance Vector Routing Protocols. Routing Protocols and Concepts Ola Lundh

Distance Vector Routing Protocols. Routing Protocols and Concepts Ola Lundh Distance Vector Routing Protocols Routing Protocols and Concepts Ola Lundh Objectives The characteristics of distance vector routing protocols. The network discovery process of distance vector routing

More information

MPLS Architecture for evaluating end-to-end delivery

MPLS Architecture for evaluating end-to-end delivery International Journal of Scientific and Research Publications, Volume 2, Issue 11, November 2012 1 MPLS Architecture for evaluating end-to-end delivery Nikita Wadhera Lovely Professional University Abstract-

More information

Link-State Routing Protocols

Link-State Routing Protocols Link-State Routing Protocols Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Objectives Link-state routing protocol Single-area OSPF concepts Single-area OSPF

More information

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs A Silicon Valley Insider MPLS VPN Services PW, VPLS and BGP MPLS/IP VPNs Technology White Paper Serge-Paul Carrasco Abstract Organizations have been demanding virtual private networks (VPNs) instead of

More information

RFC 2547bis: BGP/MPLS VPN Fundamentals

RFC 2547bis: BGP/MPLS VPN Fundamentals White Paper RFC 2547bis: BGP/MPLS VPN Fundamentals Chuck Semeria Marketing Engineer Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2001 or 888 JUNIPER www.juniper.net

More information

MPLS Concepts. MPLS Concepts

MPLS Concepts. MPLS Concepts MPLS Concepts MPLS: Multi Protocol Label Switching MPLS is a layer 2+ switching MPLS forwarding is done in the same way as in VC (Virtual Circuit) switches Packet forwarding is done based on Labels MPLS

More information

Design of MPLS networks VPN and TE with testing its resiliency and reliability

Design of MPLS networks VPN and TE with testing its resiliency and reliability MASARYK UNIVERSITY FACULTY OF INFORMATICS Design of MPLS networks VPN and TE with testing its resiliency and reliability Diploma thesis Michal Aron Brno, spring 2014 ZADANIE DP Declaration I declare

More information

Lecture 12: Link-state Routing"

Lecture 12: Link-state Routing Lecture 2: Link-state Routing" CSE 23: Computer Networks Alex C. Snoeren HW 3 due next Tuesday! Lecture 2 Overview" Routing overview Intra vs. Inter-domain routing Link-state routing protocols CSE 23 Lecture

More information

Configuring Dual VPNs with Dual ISP Links Using ECMP Tech Note PAN-OS 7.0

Configuring Dual VPNs with Dual ISP Links Using ECMP Tech Note PAN-OS 7.0 Configuring Dual VPNs with Dual ISP Links Using ECMP Tech Note PAN-OS 7.0 Revision A 2015, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Use Case... 3 Equal Cost MultiPath (ECMP)...

More information

Bell Aliant. Business Internet Border Gateway Protocol Policy and Features Guidelines

Bell Aliant. Business Internet Border Gateway Protocol Policy and Features Guidelines Bell Aliant Business Internet Border Gateway Protocol Policy and Features Guidelines Effective 05/30/2006, Updated 1/30/2015 BGP Policy and Features Guidelines 1 Bell Aliant BGP Features Bell Aliant offers

More information

BGP Convergence in much less than a second Clarence Filsfils - [email protected]

BGP Convergence in much less than a second Clarence Filsfils - cf@cisco.com BGP Convergence in much less than a second Clarence Filsfils - [email protected] 1 Down Convergence T1 Down Convergence T2 Default metric = 1 Src R R 20 F Dst Link L Assume a flow from Src to Dest T1: when

More information

Relationship between SMP, ASON, GMPLS and SDN

Relationship between SMP, ASON, GMPLS and SDN Relationship between SMP, ASON, GMPLS and SDN With the introduction of a control plane in optical networks, this white paper describes the relationships between different protocols and architectures. Introduction

More information