ENSURING RAPID RESTORATION IN JUNOS OS-BASED NETWORKS

Size: px
Start display at page:

Download "ENSURING RAPID RESTORATION IN JUNOS OS-BASED NETWORKS"

Transcription

1 WHITE PAPER ENSURING RAPID RESTORATION IN JUNOS OS-BASED NETWORKS A Complete Convergence Solution Based on Local Repair, Loop Free Alternates, and Hierarchical Forwarding Copyright 0, Juniper Networks, Inc.

2 Table of Contents Executive Summary Introduction Network Convergence Overview Detecting the Failure Communicating the Failure Information Flooding Finding an Alternate Path Updating the Forwarding Plane The Task of Convergence Components of a Complete Convergence Solution Local Repair Loop Free Alternates Hierarchical FIB Indirect Next Hops Composite Next Hops Selector Next Hops BGP Add-Path Convergence Scenarios and Configurations Configuration : Core Node/Link Failure in an IP Network Configuration Example Configuration : Core Node in an MPLS/VPN Network Configuration Example Conclusion References End-to-End Service Restoration White papers About Juniper Networks Copyright 0, Juniper Networks, Inc.

3 Table of Figures Figure : The many factors that impact convergence Figure : Local repair enables traffic to be rerouted before global convergence occurs Figure : Traditional implementations require individual next-hop updates, slowing convergence Figure : With indirect next hops, only one update needs to be made Figure : Traditionally, next hops are assigned by VPN label, requiring multiple route updates in the event of failure Figure 6: Composite next hops split inner and outer label, enabling efficient use of indirect next hops for VPNs Figure 7: With selector next hops, selectors switch over from first label to second label quickly Figure 8: Hierarchical FIB (indirect, composite, and selector next hops) reduces the time it takes to update forwarding tables Figure 9: BGP restoration behavior without BGP Add-Path Figure : BGP restoration behavior with BGP Add-Path Figure : Sample network, core link failure Figure : Global convergence could take many seconds Figure : With LFA and hierarchical forwarding, a local repair () can be made, and global convergence () occurs more rapidly. Indirect next hop optimizes the convergence of a large number of route updates Figure : Default behavior in a core MPLS/VPN network Figure : LFA and hierarchical forwarding, enable a local repair (), and composite next hop optimizes the convergence of a large number of route updates Copyright 0, Juniper Networks, Inc.

4 Executive Summary As network reliability and uptime become increasingly important, service providers are focused on improving the speed of convergence in IP/MPLS networks. While many advances have been made, achieving rapid convergence only becomes more challenging as IP networks grow larger and more complex. This paper examines the many factors that contribute to convergence in large-scale networks, and the mechanisms available within Juniper Networks Junos operating system that are capable of speeding up the convergence process. This will be followed by examples that compare the convergence times using the new Junos OS features with those possible using other techniques. This paper is essential reading for network planners seeking to improve the availability of their IP/MPLS networks through more rapid convergence. Readers will gain an understanding of the processes that influence convergence and what can be done to optimize each process. They will also learn how Juniper Networks is leading the way toward sub- 0 ms convergence times. This paper assumes a basic understanding of IP protocols and MPLS/LDP. Introduction In the ongoing pursuit of improved network reliability and uptime, one of the most important considerations is reducing convergence time. Failures are bound to occur in even the most well designed networks, and the ability to recover from these failures rapidly and with minimal traffic loss is key to meeting the demands of today s services and subscribers. Network convergence is a complex process that increases in complexity as the network increases in size. In large-scale networks, end-to-end convergence often involves the restoration of a number of independent network protocols. A link failure in the core network, for example, will affect the protocols that run directly over it. But looking through a wider lens, those protocols might in turn affect other protocols that build upon them. A single link failure in the core can have adverse effects on many customers and end users who run services over a network. Therefore, to improve network convergence, a solution must consider all of the protocols and factors that can impact convergence not just a single protocol. Achieving the ultimate goal of end-to-end restoration in under 0 milliseconds will only be possible with a holistic approach that considers all aspects of the convergence process. To put this in perspective, it is first helpful to review exactly what comprises the convergence process. Network Convergence Overview The time it takes for a network to converge following a link or node failure can vary dramatically based on a number of factors, including network size, the protocols used, and network design. However, while each particular convergence event is different, the process of convergence is essentially consistent. There are four basic stages that are involved in a network convergence event, which typically occur in the following order:. Detecting the failure. Flooding of information. Finding the alternate path. Updating forwarding plane While each of these processes individually may seem to occur rapidly, it is important to review the effect of each on the convergence process to gain a better understanding of where the most improvements are possible. In the following sections, we will briefly review the effects each stage has on network convergence. Detecting the Failure There are different types of network events that can cause failures link failure, line card failure, router failure, administrative link removal, cost change, etc. Regardless of the cause, the first step in any convergence event is detecting the failure. There are many available failure detection mechanisms, some working at the link-layer level, some embedded in protocols, and others working independent of protocols. The best results are achieved by using a combination of multiple mechanisms. Using link-layer detection mechanisms such as loss of light (LOL) and bit error rate (BER) alarms is by far the fastest. The interrupt-driven nature of interface events in Junos OS software keeps detection time as low as a few milliseconds. However, not all failures can be detected at the link-layer level. Copyright 0, Juniper Networks, Inc.

5 Indirect link failures or unidirectional link issues that rely on interior gateway protocol (IGP) timers for failure detection can lead to significant network downtime. Although the timers are often tunable, setting them too low might cause side effects in other scenarios. For example, when graceful restart is enabled, the hold time ( times of hello timer) should be higher than the Routing Engine (RE) switchover time. Bidirectional Forwarding Detection (BFD) protocol is another common way to detect failures, and can be used to complement and enhance the previously described mechanisms. BFD is not attached to any specific media or protocol, so one of its advantages is the ability to work with a variety of network environments and topologies. The failure detection timers within BFD have shorter time limits than that of protocols such as OSPF, IS-IS, or BGP, providing faster detection. There are also other means to detect failures, including Operation, Administration, and Maintenance (OAM) connectivity check protocols such as Ethernet OAM, Point-to-Point Protocol (PPP) keepalives, ATM OAM alarm indication signal (AIS), etc. Which protocols an operator chooses to use will depend on the unique network design and requirements. When the failures are detected faster, networks can react to them sooner, and alternate paths can be selected more quickly, speeding up network convergence. Failure detection is probably the aspect of convergence that is best understood, and most networks are designed to detect failures within several milliseconds. Communicating the Failure Information Flooding Once a failure has been detected, the failure and the resulting topology change need to be communicated to other devices in the network. After a router detects link failures or topology changes, it needs to send important topology change updates to its neighbors, and it needs to react to the topology change updates that it receives from its neighbors in turn. These updates are sent through the network at the speed of light, so the time taken for devices in the network to receive updates depends on the network diameter and how close a particular device is located to the failure. Finding an Alternate Path After being notified of a failure event, devices on the network need to process the information and calculate an alternate path. For link state protocols such as IS-IS and OSPF, this means running a new shortest-path-first (SPF) calculation. For BGP, it means a new path selection calculation based on criteria such as weights, local preferences, AS_Path, etc. A common misconception here is that the SPF calculations add a significant amount of time to the convergence process. However, due to the advances in processor technology, this is no longer the case. With Juniper Networks latest Routing Engines, a full SPF calculation even with thousands of routers can be performed in a few milliseconds. Updating the Forwarding Plane Once an alternate path is found, the router needs to update its forwarding table commonly known as the forwarding information base (FIB) with the new next hop for all affected prefixes. Traditionally, the time this process consumes has directly correlated to the number of routes in the network and is bound to memory access time. In other words, the more prefixes that need updating, the longer the process will take. A core link failure might result in IGP reconvergence, which can affect tens or hundreds of thousands of BGP or routes. FIB update is a vendorspecific implementation and can be optimized to cut a significant amount of convergence time. For example, updating 00,000 routes can be optimized and reduced by tenfold. The graphic in Figure illustrates each of these processes, and shows the approximate times that each adds to the process of convergence. Failure detected (< ms) ms Topology change communicated Routers perform new SPF calculations Speed of light ms Routers update FIB, begin re-routing traffic s of seconds Figure : The many factors that impact convergence. For more information on Juniper s forwarding plane technology, please refer to Juniper Networks T Series Core Routers Architecture Overview. Copyright 0, Juniper Networks, Inc.

6 The Task of Convergence With an understanding of the various steps that can impact convergence, we can begin to focus on the areas that have the potential for the greatest returns in terms of speeding the process of convergence. The detection process is perhaps the most widely understood, and the various techniques described above can be effectively used to optimize the speed of detection in most networks. This paper, therefore, will not cover detection mechanisms in detail beyond the information provided above. In some of the other areas, there has already been much progress made in recent years towards improving convergence times with more efficient operating systems and more powerful routing hardware. Junos OS, for example, offers low protocol timers optimized for modern networks, and new routing platforms are capable of processing and calculating the new SPF much more quickly and efficiently. However, some aspects of end-to-end convergence are still bound by basic physics specifically, the speed of light. For link-state protocols such as IS-IS and OSPF, once the failure event is detected at the immediate neighbor node, it needs to be processed and propagated throughout the rest of the network. Propagation speed in fibers happens at the speed of light (about km/ms), so how quickly a node gets updated is directly related to its distance from the failure point. Though the speed of light is fast, it is simply not fast enough for some of the largest networks for example, a network with a diameter larger than,00 km (,00 miles) would be incapable of delivering convergence in under 0 milliseconds simply because of the propagation delay. Therefore, to achieve true <0 ms end-to-end convergence times an objective that Juniper Networks is actively striving towards a solution must find a way to sidestep these limits of physics. The answer is a combination of local repair and hierarchical forwarding tables as outlined below. When combined with the latest detection mechanisms and routing hardware and software, these lay the foundation for true, end-to-end restoration in under 0 ms. Components of a Complete Convergence Solution Achieving sub 0 ms convergence is relatively easy in small networks, but, as described above, many of the individual components of convergence begin to slow rapidly as the network scales. Specifically, geographically large networks face challenges from propagation delays, and networks with a large number of nodes (regardless of geographic characteristics) are slowed by the number of route updates that must be processed. Thus, the goal of rapid convergence can only be attained with a solution that enables fast convergence independent of network size. Some in the industry promote what is called prefix independent convergence, the ability to deliver fast convergence regardless of the number of BGP prefixes in the network. While this is certainly an important part of a complete convergence solution, it is only one aspect. Fast convergence also relies on speeding both IGP and BGP convergence, must work for all services, and must accelerate all of the processes outlined above. Juniper s complete convergence solution ensures both fast IGP and BGP convergence, and also extends this with techniques such as local repair and loop free alternate routes. Local Repair One way to speed convergence is to create a solution that can implement a repair that can be implemented before all the routers in the network have been notified and had their forwarding tables updated. This is known as a local repair (in contrast to the global repair scenario described above). Local repairs can be implemented immediately upon failure detection, while in the meantime, the routing software will continue to recalculate the entire network topology. Local repair and global repair are thus complementary local repair enables traffic to continue to be routed using a backup path until global repair is able to calculate a new optimal route. Eventually the entire network converges with the recalculated topology, but because the local repair is implemented immediately, disruption to traffic can be kept well under 0 ms. For a local repair to be possible, the following needs to occur: The forwarding table needs to be pre-populated with a viable backup path. There must be a shortcut path for forwarding table updates for backup path switching. 6 Copyright 0, Juniper Networks, Inc.

7 Reconsidering Figure, this means that after the link driver reports the link down message, the ukernel starts to activate the backup paths into the data plane FIB right away. Figure illustrates how local repair can reroute traffic in under 0 ms, enabling traffic to continue to flow while the rest of the global repair procedures play out. Local repair can be achieved in under 0 ms Failure detected (< ms) ms Local repair: traffic automatically rerouted to precalculated backup 0 ms Topology change communicated Routers perform new SPF calculations Routers update FIB, begin re-routing traffic based on global repair (if different) Speed of light ms s of seconds Global repair can continue while traffic rerouted to local repair route Figure : Local repair enables traffic to be rerouted before global convergence occurs. Local repair has long been available in networks that use RSVP-TE in the form of MPLS fast reroute. Since networks often use a mix of RSVP and LDP, a complete convergence solution must be capable of performing local repairs in an LDP-based network as well. Since LDP relies on IGP (OSPF or IS-IS) for the underlying routing and topology information, the backup route for a local repair in LDP networks must be added to the IGP. With Loop-Free Alternates (LFA), Juniper has pioneered an approach that brings MPLS fast reroute-like capabilities to OSPF and IS-IS-based IP/MPLS networks. By adding a preinstalled backup next hop into the forwarding plane (similar to fast reroute), LFA provides both link and node protection, and consistent sub-0 ms IGP convergence times that are independent of the size of the network, without adding operational burden. Loop Free Alternates A more detailed explanation of LFA is available in the paper Understanding and Deploying Loop Free Alternates; here we will only provide a brief overview. Essentially LFA works by using the IGP to pre-calculate an alternate less-than-equal path, and ensure that that path does not create any forwarding loops. This path is then configured in the forwarding table of LFA-enabled routers, allowing them to rapidly switch to the loop free path in the event of a failure. LFA can be configured on a per-router basis and they require other routers in the network to be aware of, or supporting, the protocol. LFA can be deployed in strategic locations to protect traffic and ensure sub-0 ms restoration in LDPbased networks. Hierarchical FIB Techniques such as LFA are very effective at improving IGP convergence time. But fast IGP convergence is only part of the equation. In today s networks, other protocols and services build upon IGP and therefore are affected by failures that cause IGP reconvergence. For example, a router obtains the direct next hop (or outgoing interface) of its BGP prefixes based on IGP reachability. BGP prefixes along with their direct next hop information are installed in the forwarding table in the Packet Forwarding Engine (PFE), and therefore need to be updated if the direct next hop is affected by the IGP convergence. In traditional implementations, there is a linear correlation between the number of routes affected by a given link and the restoration time. This is because each route points to its corresponding direct next hop or outgoing interface, meaning in the event of a failure, all of these routes must be updated with the new next hop. Copyright 0, Juniper Networks, Inc. 7

8 Route P Direct next hop Direct next hop Route P Direct next hop Direct next hop Route P Direct next hop Direct next hop Figure : Traditional implementations require individual next-hop updates, slowing convergence. In the network with a large number of BGP routes, this can take a long time. Therefore, a more scalable solution is needed so that the convergence time does not increase linearly as the network grows. The solution is a hierarchical FIB that can take advantage of indirect next hops. Hierarchical FIB reduces the convergence time associated with updating large numbers of BGP routes by introducing an indirect next hop. Indirect Next Hops Indirect next hops are a logical device that enables multiple routes in the routing table to point to a single next hop. By configuring an indirect next hop in the FIB, all routes for a given interface point to this indirect next hop, which then points to the actual next hop. The benefit of this approach is that in the event of a failure, the routes themselves do not need to be updated individually (since they still point to the indirect next hop); instead, only the pointer between the indirect next hop and the next hop needs to be changed, thus greatly reducing the update time. Route P Route P Indirect next hop Direct next hop Route P Direct next hop Figure : With indirect next hops, only one update needs to be made. Composite Next Hops The support of indirect next hops in the forwarding plane is capable of reducing the time to convergence from tens of seconds to several milliseconds. However, indirect next hops only works for BGP prefixes labels can present additional challenges. In Junos OS, routes from a VPN routing and forwarding (VRF) table from the same provider edge (PE) router typically share the same VPN label, so routes from the same VRF table and from the same PE router can point to a single indirect next hop. However, routers from other vendors allocate one VPN label per route, which can lead to multiple indirect next hops defeating the purpose of using indirect next hops. Since most networks are multivendor environments, Juniper has developed the concept of composite next hops to provide greater scaling and faster convergence for layer VPNs. In an IP/MPLS network, PE routers accept BGP updates with VPN labels. The information is installed in the forwarding table, along with a transport label (outer label) to reach the remote PE router beyond which the destinations can be reached. 8 Copyright 0, Juniper Networks, Inc.

9 Traditionally, each prefix (VPN label + outer label) points to a pair even though they often have the same outer label. Therefore, when there is a network convergence event that changes the outer label, every prefix needs to be updated (Figure ). As with indirect next hops in an IP network, there is a linear correlation between the number of routes affected by a given link and restoration time. Route P VPN Label + Outer Label VPN Label + Outer Label Route P VPN Label + Outer Label VPN Label + Outer Label Route P VPN Label + Outer Label VPN Label + Outer Label Figure : Traditionally, next hops are assigned by VPN label, requiring multiple route updates in the event of failure. Composite next hops work by splitting the inner and outer label. With a composite next hop, Juniper routers accept a large number of Layer VPN BGP updates with unique inner VPN labels. When the prefixes are installed in the forwarding table, they point to an indirect next hop, which points to an outer label. The router assigns indirect next hops according to the outer labels (Figure 6). The benefit of this approach is that in the event of a failure, only the pointer between the indirect next hop and the outer label needs to be changed, thus greatly reducing the update time. Route P VPN Label Route P VPN Label Indirect next hop Outer label Route P VPN Label Outer label Figure 6: Composite next hops split inner and outer label, enabling efficient use of indirect next hops for VPNs. Copyright 0, Juniper Networks, Inc. 9

10 Selector Next Hops Composite next hops reduce convergence time significantly when the VPN prefixes have the same exit points. However, when they have different exit points, they can t be grouped together by means of indirect next hops, and this is where selector next hops come into the picture. With selector next hops (Figure 7), each prefix points to a selector, which points to a pair of labels. There is a separate indicator that informs the selector which label to use for forwarding whether it be the first label or the second label. Using selector next hops brings a significant improvement in convergence time when there are large numbers of labelswitched paths (LSPs) in the core network. Route P Selector Label u or v Route P Selector Label w or x Route P Selector Label y or z Use st label Figure 7: With selector next hops, selectors switch over from first label to second label quickly. The use of indirect next hops, composite next hops, and selector next hops accelerates the process of updating the forwarding plane, and this speeds the global repair process. Taking another look at the convergence process illustrated earlier, Figure 8 shows how creating a hierarchical FIB using indirect and composite next hops can bring this time down to tens of milliseconds. Failure detected (< ms) ms Local repair: traffic automatically rerouted to precalculated backup Topology change communicated Routers perform new SPF calculations Hierarchical FIB minimizes convergence time for updating large number of routes Routers update FIB, begin re-routing traffic based on global repair (if different) 0 ms Speed of light ms s of seconds ms Figure 8: Hierarchical FIB (indirect, composite, and selector next hops) reduces the time it takes to update forwarding tables. Copyright 0, Juniper Networks, Inc.

11 BGP Add-Path Hierarchical FIB dramatically improves convergence speed in the event of a core link or node failure. However, when a remote (egress) PE router on the primary forwarding path becomes unavailable, the ingress PE router won t be able to benefit from hierarchical FIB. Therefore, as we strive toward sub-0 ms convergence, there needs to be a new mechanism to improve the failover time for remote PE route failures as well. This is achieved through a technique called BGP Add-Path, which modifies the way route reflectors advertise paths. Most BGP networks today use route reflectors to reduce the number of peering sessions between BGP speakers, and to provide a cleaner, hierarchical topology. By default, route reflectors reflect one best path to its peers for a given address prefix. When the best path becomes unavailable, the route reflector withdraws that path from its peers, recalculates a new path, and advertises the new best path to all peers (Figure 9). This requires both BGP and IGP convergence and can therefore be a lengthy process. RR Both PE and PE advertise prefixes to RR RR picks the best part (PE) and advertises to its peers PE failure RR detects the failure, withdraw paths through PE, and advertise new best path (PE) PE reroutes traffic VPNs PE PE P P IP/MPLS core PE PE VPNs Figure 9: BGP restoration behavior without BGP Add-Path. BGP Add-Path reduces the time taken in this process by allowing the route reflector to advertise multiple paths for the same address prefix (Figure ) without the new paths implicitly replacing existing paths. With BGP Add-Path, ingress PE routers can switch over to the alternate paths quickly upon the detection of remote PE router failure. Since failure detection is based on IGP time rather than BGP time, this occurs much more quickly. In addition to providing rapid convergence, BGP Add-Path can enable load balancing between the multiple paths advertised by the route reflector. RR Both PE and PE advertise prefixes to RR PE RR advertises both paths to PE and PE picked the best path (PE) PE failure VPNs P PE VPNs PE detects the failure of PE and switches to alternate path (PE) PE P IP/MPLS core PE Figure : BGP restoration behavior with BGP Add-Path. Copyright 0, Juniper Networks, Inc.

12 Convergence Scenarios and Configurations When applied together, the combination of detection mechanisms, local repair, loop free alternates, and hierarchical forwarding can provide dramatic increases in convergence time. Juniper s routers are the only platforms in the industry that combine all of these features driving rapid convergence. In this section, we will outline several scenarios and provide sample configurations that illustrate how to take advantage of the techniques outlined above. Configuration : Core Node/Link Failure in an IP Network In the sample network below (Figure ), PE receives BGP route prefixes from PE. Through an IGP calculation (OSPF or IS-IS), PE determines that P is the next hop for the received BGP routes, and by default PE installs BGP routes each with a pointer to P. RR PE PE P EBGP peer Peer EBGP peer PE P PE Figure : Sample network, core link failure. If a failure were to make the link between P and PE no longer available, the default behavior would be to flood information back to PE, which would then run an SPF calculation and determine that PE is now available through P, instead of P. It would then update next-hop information for all prefixes in the affected FIB. Traffic then follows arrow in Figure. As described above, this can take a significant amount of time in a large network. Route Direct next hop RR 0...x/ P 0...x/ P 0...x/ P.... P P P PE P PE EBGP peer Peer PE PE Figure : Global convergence could take many seconds. P EBGP peer Copyright 0, Juniper Networks, Inc.

13 When the network is capable of performing a local repair using LFA, traffic will continue to be forwarded via the pre-computed, preinstalled backup route (arrow in Figure ) while IGP recalculates the shortest path. When the alternate path is available (arrow ) on PE, it updates the next-hop information for the BGP routes affected. The difference is that indirect next hop enables all affected prefixes to be updated at once reducing convergence time to 0 ms for 00,000 routes from tens of seconds. Route Indirect next hop Next hop RR 0...x/ 0...x/ 0...x/ X P P.. PE PE P Peer PE P PE Configuration Example Figure : With LFA and hierarchical forwarding, a local repair () can be made, and global convergence () occurs more rapidly. Indirect next hop optimizes the convergence of a large number of route updates. Loop Free Alternates and Local Repair policy-options { policy-statement lb { then { load-balance per-packet; routing-options { forwarding-table { export lb; protocols { isis { interface so-/0/0 { nodelink-protection; interface so-/0/0 { link-protection; interface so-7/0/0 { no-eligible-backup; Indirect Next-Hop Configuration routing-options { forwarding-table indirect-next-hop Copyright 0, Juniper Networks, Inc.

14 Configuration : Core Node in an MPLS/VPN Network In the sample MPLS network below (Figure ), PE receives prefixes through multiprotocol BGP. Through an IGP calculation (OSPF or IS-IS) and LDP label exchange, PE populates its forwarding table with information necessary to reach remote destinations. When making a forwarding decision, PE pushes two labels to the packets VPN label (inner label) and a MPLS core label (outer label). If a failure were to make the link between P and PE no longer available, the default behavior would be for IGP to flood information back to PE as is done in an IP network, and for LDP to re-exchange label information. It then updates next-hop and label information for all prefixes in the affected FIB. Traffic then follows arrow in Figure. As described above, this can take a significant amount of time in a large network. Route Indirect next hop Label RR 0...x/ P P x/ P P x/ P P PE PE VPNs P VPNs PE P IP/MPLS core PE Figure : Default behavior in a core MPLS/VPN network. Similar to scenario, with LFA and local repair, traffic will continue to be forwarded via the pre-computed, preinstalled backup route (arrow in Figure ), while IGP recalculates the shortest path and LDP exchanges new label information. When the alternate path is available (arrow ) on PE, it updates the next-hop information for the BGP routes affected (Figure ). The difference here is that composite next hop separates inner and outer labels, and all affected prefixes that share a common BGP next hop can be updated at once. Route VPN label Label RR 0...x/ 0...x/ 0...x/ PE PE VPNs P VPNs PE P IP/MPLS core PE Figure : LFA and hierarchical forwarding, enable a local repair (), and composite next hop optimizes the convergence of a large number of route updates. Copyright 0, Juniper Networks, Inc.

15 Configuration Example Loop Free Alternates and Local Repair policy-options { policy-statement lb { then { load-balance per-packet; routing-options { forwarding-table { export lb; protocols { isis { interface so-/0/0 { nodelink-protection; interface so-/0/0 { link-protection; interface so-7/0/0 { no-eligible-backup; Indirect Next-Hop and Composite Next-Hop Configuration routing-options { forwarding-table indirect-next-hop; lvpn-composite-nexthop; Conclusion Rapid convergence is a complex but attainable goal. Achieving sub-0 ms convergence is a matter of breaking down the process of convergence into its underlying components and improving the efficiency of each. By leveraging a combination of link-layer, protocol-based, and protocol independent detection mechanisms, failures can be discovered as quickly as possible. Techniques such as local repair and LFA enable traffic to continue to flow even during the information flooding and propagation stages. And hierarchical forwarding dramatically speeds the process of updating the forwarding plane. Together, these processes only possible on Juniper routing systems can move the industry closer to the goal of consistent sub-0 ms convergence. Networks that employ these techniques and technologies will operate with increased availability and uptime, reducing the cost of downtime and maximizing the network s revenue generating potential. References The techniques and technologies described in this document can be used to dramatically speed convergence in some networks, consistently achieving restoration times under 0 milliseconds is quite feasible. Juniper Networks long-term vision is to enable no excuses sub-0 ms convergence for all networks. In this paper published by the Ethernet Academy, Juniper Fellow Kireeti Kompella outlines the future of MPLS transport and how this vision can be made a reality. Copyright 0, Juniper Networks, Inc.

16 End-to-End Service Restoration Additional information on Juniper Networks commitment to maximum uptime and continuous systems availability can be found within the following documents. White papers Unified ISSU: A Complete Approach to In-Service Software Upgrades Continuous Systems, Nonstop Operations with Junos OS Juniper Networks T Series Core Routers Architecture Overview About Juniper Networks Juniper Networks, Inc. is the leader in high-performance networking. Juniper offers a high-performance network infrastructure that creates a responsive and trusted environment for accelerating the deployment of services and applications over a single network. This fuels high-performance businesses. Additional information can be found at Corporate and Sales Headquarters APAC Headquarters EMEA Headquarters To purchase Juniper Networks solutions, Juniper Networks, Inc. 9 North Mathilda Avenue Sunnyvale, CA 9089 USA Phone: 888.JUNIPER ( ) or Fax: Juniper Networks (Hong Kong) 6/F, Cityplaza One King s Road Taikoo Shing, Hong Kong Phone: Fax: Juniper Networks Ireland Airside Business Park Swords, County Dublin, Ireland Phone: EMEA Sales: Fax: please contact your Juniper Networks representative at or authorized reseller. Copyright 0 Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper Networks logo, Junos, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered marks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice EN Mar 0 Printed on recycled paper 6 Copyright 0, Juniper Networks, Inc.

Demonstrating the high performance and feature richness of the compact MX Series

Demonstrating the high performance and feature richness of the compact MX Series WHITE PAPER Midrange MX Series 3D Universal Edge Routers Evaluation Report Demonstrating the high performance and feature richness of the compact MX Series Copyright 2011, Juniper Networks, Inc. 1 Table

More information

Monitoring Network Traffic Using sflow Technology on EX Series Ethernet Switches

Monitoring Network Traffic Using sflow Technology on EX Series Ethernet Switches APPLICATION NOTE Monitoring Network Traffic Using sflow Technology on EX Series Ethernet Switches Exporting sflow to Collectors Through a Separate Virtual Routing Instance Copyright 2009, Juniper Networks,

More information

MONITORING NETWORK TRAFFIC USING sflow TECHNOLOGY ON EX SERIES ETHERNET SWITCHES

MONITORING NETWORK TRAFFIC USING sflow TECHNOLOGY ON EX SERIES ETHERNET SWITCHES APPLICATION NOTE MONITORING NETWORK TRAFFIC USING sflow TECHNOLOGY ON EX SERIES ETHERNET SWITCHES Exporting sflow to Collectors Through a Separate Virtual Routing Instance Copyright 2010, Juniper Networks,

More information

Fast Re-Route in IP/MPLS networks using Ericsson s IP Operating System

Fast Re-Route in IP/MPLS networks using Ericsson s IP Operating System Fast Re-Route in IP/MPLS networks using s IP Operating System Introduction: Today, Internet routers employ several routing protocols to exchange routes. As a router learns its potential routes, it builds

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Load Balancing Layer 3 VPN Traffic While Simultaneously Using IP Header Filtering Published: 2014-01-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California

More information

IF-MAP FEDERATION WITH JUNIPER NETWORKS UNIFIED ACCESS CONTROL

IF-MAP FEDERATION WITH JUNIPER NETWORKS UNIFIED ACCESS CONTROL IF-MAP FEDERATION WITH JUNIPER NETWORKS UNIFIED ACCESS CONTROL An illustrated Guide to Configuring a Simple IF-MAP Federated Network Juniper Networks, Inc. 1 Table of Contents Introduction...3 Scope...3

More information

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers SOLUTION BRIEF Enterprise Data Center Interconnectivity Increase Simplicity and Improve Reliability with VPLS on the Routers Challenge As enterprises improve business continuity by enabling resource allocation

More information

Introducing Basic MPLS Concepts

Introducing Basic MPLS Concepts Module 1-1 Introducing Basic MPLS Concepts 2004 Cisco Systems, Inc. All rights reserved. 1-1 Drawbacks of Traditional IP Routing Routing protocols are used to distribute Layer 3 routing information. Forwarding

More information

Network and Security. Product Description. Product Overview. Architecture and Key Components DATASHEET

Network and Security. Product Description. Product Overview. Architecture and Key Components DATASHEET DATASHEET Network and Security Manager Product Overview Network and Security Manager provides unparalleled capability for device and security policy configuration, comprehensive monitoring, reporting tools,

More information

Reasons Enterprises. Prefer Juniper Wireless

Reasons Enterprises. Prefer Juniper Wireless Reasons Enterprises Prefer Juniper Wireless Juniper s WLAN solution meets the mobility needs of today s enterprises by delivering the highest levels of reliability, scalability, management, and security.

More information

WHITE PAPER. Copyright 2011, Juniper Networks, Inc. 1

WHITE PAPER. Copyright 2011, Juniper Networks, Inc. 1 WHITE PAPER Network Simplification with Juniper Networks Technology Copyright 2011, Juniper Networks, Inc. 1 WHITE PAPER - Network Simplification with Juniper Networks Technology Table of Contents Executive

More information

RFC 2547bis: BGP/MPLS VPN Fundamentals

RFC 2547bis: BGP/MPLS VPN Fundamentals White Paper RFC 2547bis: BGP/MPLS VPN Fundamentals Chuck Semeria Marketing Engineer Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2001 or 888 JUNIPER www.juniper.net

More information

Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang [email protected] AT&T

Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang luyuanfang@att.com AT&T Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang [email protected] AT&T 1 Outline! BGP/MPLS VPN (RFC 2547bis)! Setting up LSP for VPN - Design Alternative Studies! Interworking of LDP / RSVP

More information

SoLuTIoN guide. CLoud CoMPuTINg ANd ThE CLoud-rEAdy data CENTEr NETWork

SoLuTIoN guide. CLoud CoMPuTINg ANd ThE CLoud-rEAdy data CENTEr NETWork SoLuTIoN guide CLoud CoMPuTINg ANd ThE CLoud-rEAdy data CENTEr NETWork Contents BENEfITS of ThE CLoud-rEAdy data CENTEr NETWork............................3 getting ready......................................................................3

More information

TOPOLOGY-INDEPENDENT IN-SERVICE SOFTWARE UPGRADES ON THE QFX5100

TOPOLOGY-INDEPENDENT IN-SERVICE SOFTWARE UPGRADES ON THE QFX5100 White Paper TOPOLOGY-INDEPENDENT IN-SERVICE SOFTWARE UPGRADES ON THE QFX5100 Juniper Innovation Brings ISSU to Data Center Top-of-Rack Switches Copyright 2014, Juniper Networks, Inc. 1 Table of Contents

More information

Voice Modules for the CTP Series

Voice Modules for the CTP Series DATASHEET Voice Modules for the CTP Series Product Overview Enterprise organizations are leveraging the cost savings associated with IP transport for a variety of new packet based multimedia services.

More information

Simplifying the Data Center Network to Reduce Complexity and Improve Performance

Simplifying the Data Center Network to Reduce Complexity and Improve Performance SOLUTION BRIEF Juniper Networks 3-2-1 Data Center Network Simplifying the Data Center Network to Reduce Complexity and Improve Performance Challenge Escalating traffic levels, increasing numbers of applications,

More information

Virtual Private LAN Service (VPLS)

Virtual Private LAN Service (VPLS) White Paper Virtual Private LAN Service (VPLS) Scalable Ethernet-Based Enterprise Connectivity and Broadband Delivery Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408.745.2000

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring a Single SRX Series Device in a Branch Office Published: 2014-01-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000

More information

Configuring and Implementing A10

Configuring and Implementing A10 IMPLEMENTATION GUIDE Configuring and Implementing A10 Networks Load Balancing Solution with Juniper s SSL VPN Appliances Although Juniper Networks has attempted to provide accurate information in this

More information

NETWORK AND SECURITY MANAGER

NETWORK AND SECURITY MANAGER DATASHEET NETWORK AND SECURITY MANAGER Product Overview Juniper Networks Network and Security Manager (NSM) is a unified device management solution for Juniper s network infrastructure of routing, switching

More information

PERFORMANCE VALIDATION OF JUNIPER NETWORKS SRX5800 SERVICES GATEWAY

PERFORMANCE VALIDATION OF JUNIPER NETWORKS SRX5800 SERVICES GATEWAY APPLICATION NOTE PERFORMANCE VALIDATION OF JUNIPER NETWORKS SRX5800 SERVICES GATEWAY Copyright 2010, Juniper Networks, Inc. Table of Contents Introduction........................................................................................

More information

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service Nowdays, most network engineers/specialists consider MPLS (MultiProtocol Label Switching) one of the most promising transport technologies. Then, what is MPLS? Multi Protocol Label Switching (MPLS) is

More information

ENTERPRISE SOLUTION FOR DIGITAL AND ANALOG VOICE TRANSPORT ACROSS IP/MPLS

ENTERPRISE SOLUTION FOR DIGITAL AND ANALOG VOICE TRANSPORT ACROSS IP/MPLS SOLUTION BRIEF ENTERPRISE SOLUTION FOR DIGITAL AND ANALOG VOICE TRANSPORT ACROSS IP/MPLS IT Organizations Can Reduce Costly TDM Leased Line Fees Challenge IP networks were not designed to transport bit-synchronous

More information

MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans

MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans Contents Overview 1 1. L2 VPN Padding Verification Test 1 1.1 Objective 1 1.2 Setup 1 1.3 Input Parameters 2 1.4 Methodology 2 1.5

More information

Optimizing VoIP Applications with Juniper Networks EX3200 and EX4200 Line of Ethernet Switches

Optimizing VoIP Applications with Juniper Networks EX3200 and EX4200 Line of Ethernet Switches APPLICATION NOTE Deploying IP Telephony with JUNIPER NETWORKS ETHERNET Switches Optimizing Applications with Juniper Networks EX3200 and EX4200 Line of Ethernet Switches Copyright 2009, Juniper Networks,

More information

WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr. 2006 Cisco Systems, Inc. All rights reserved.

WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr. 2006 Cisco Systems, Inc. All rights reserved. MPLS WAN Topologies 1 Multiprotocol Label Switching (MPLS) IETF standard, RFC3031 Basic idea was to combine IP routing protocols with a forwarding algoritm based on a header with fixed length label instead

More information

IPv6 over IPv4/MPLS Networks: The 6PE approach

IPv6 over IPv4/MPLS Networks: The 6PE approach IPv6 over IPv4/MPLS Networks: The 6PE approach Athanassios Liakopoulos Network Operation & Support Manager ([email protected]) Greek Research & Technology Network (GRNET) III Global IPv6 Summit Moscow, 25

More information

Implementing Firewalls inside the Core Data Center Network

Implementing Firewalls inside the Core Data Center Network IMPLEMENTATION GUIDE Implementing Firewalls inside the Core Data Center Network Best Practices for Implementing Juniper Networks Firewall Devices in the Data Center Core Copyright 2010, Juniper Networks,

More information

J-Flow on J Series Services Routers and Branch SRX Series Services Gateways

J-Flow on J Series Services Routers and Branch SRX Series Services Gateways APPLICATION NOTE Juniper Flow Monitoring J-Flow on J Series Services Routers and Branch SRX Series Services Gateways Copyright 2011, Juniper Networks, Inc. 1 APPLICATION NOTE - Juniper Flow Monitoring

More information

BFD. (Bidirectional Forwarding Detection) Does it work and is it worth it? Tom Scholl, AT&T Labs NANOG 45

BFD. (Bidirectional Forwarding Detection) Does it work and is it worth it? Tom Scholl, AT&T Labs NANOG 45 BFD (Bidirectional Forwarding Detection) Does it work and is it worth it? Tom Scholl, AT&T Labs NANOG 45 What is BFD? BFD provides a method to validate the operation of the forwarding plane between two

More information

Multi Protocol Label Switching (MPLS) is a core networking technology that

Multi Protocol Label Switching (MPLS) is a core networking technology that MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of

More information

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Multiprotocol Label Switching Layer 3 Virtual Private Networks with Open ShortestPath First protocol PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Abstract This paper aims at implementing

More information

IP/MPLS-Based VPNs Layer-3 vs. Layer-2

IP/MPLS-Based VPNs Layer-3 vs. Layer-2 Table of Contents 1. Objective... 3 2. Target Audience... 3 3. Pre-Requisites... 3 4. Introduction...3 5. MPLS Layer-3 VPNs... 4 6. MPLS Layer-2 VPNs... 7 6.1. Point-to-Point Connectivity... 8 6.2. Multi-Point

More information

JNCIA-Junos Study Guide Part 2

JNCIA-Junos Study Guide Part 2 Worldwide Education Services 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net This document is produced by Juniper Networks, Inc. This document or any part thereof may not

More information

Understanding Fundamental Issues with TRILL

Understanding Fundamental Issues with TRILL WHITE PAPER TRILL in the Data Center: Look Before You Leap Understanding Fundamental Issues with TRILL Copyright 2011, Juniper Networks, Inc. 1 Table of Contents Executive Summary........................................................................................................

More information

IMPLEMENTING CISCO MPLS V3.0 (MPLS)

IMPLEMENTING CISCO MPLS V3.0 (MPLS) IMPLEMENTING CISCO MPLS V3.0 (MPLS) COURSE OVERVIEW: Multiprotocol Label Switching integrates the performance and traffic-management capabilities of data link Layer 2 with the scalability and flexibility

More information

For internal circulation of BSNLonly

For internal circulation of BSNLonly E3-E4 E4 E&WS Overview of MPLS-VPN Overview Traditional Router-Based Networks Virtual Private Networks VPN Terminology MPLS VPN Architecture MPLS VPN Routing MPLS VPN Label Propagation Traditional Router-Based

More information

DEPLOYING IP TELEPHONY WITH EX SERIES ETHERNET SWITCHES

DEPLOYING IP TELEPHONY WITH EX SERIES ETHERNET SWITCHES APPLICATION NOTE DEPLOYING IP TELEPHONY WITH EX SERIES ETHERNET SWITCHES Optimizing Applications with Juniper Networks Access Switches Copyright 2011, Juniper Networks, Inc. 1 Table of Contents Introduction.....................................................................................................3

More information

Deploying IP Telephony with EX-Series Switches

Deploying IP Telephony with EX-Series Switches Application Note Deploying IP Telephony with EX-Series Switches Optimizing VoIP Applications with EX 3200 and EX 4200 Series Ethernet Switches Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale,

More information

A Set of Enhancements to the Rich MPLS Toolkit

A Set of Enhancements to the Rich MPLS Toolkit WHITE PAPER MPLS Transport Profile (MPLS-TP) A Set of Enhancements to the Rich MPLS Toolkit Copyright 2011, Juniper Networks, Inc. 1 Table of Contents Executive Summary........................................................................................................

More information

COMPREHENSIVE MPLS VPN SOLUTIONS

COMPREHENSIVE MPLS VPN SOLUTIONS SOLUTION BRIEF COMPREHENSIVE MPLS VPN SOLUTIONS Meeting the Needs of Emerging Services with Innovative Technology Challenge Meeting the dynamic requirements of rapidly growing, worldwide VPN markets Solution

More information

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS Computer Network Architectures and Multimedia Guy Leduc Chapter 2 MPLS networks Chapter based on Section 5.5 of Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley,

More information

MPLS/BGP Network Simulation Techniques for Business Enterprise Networks

MPLS/BGP Network Simulation Techniques for Business Enterprise Networks MPLS/BGP Network Simulation Techniques for Business Enterprise Networks Nagaselvam M Computer Science and Engineering, Nehru Institute of Technology, Coimbatore, Abstract Business Enterprises used VSAT

More information

MPLS in Private Networks Is It a Good Idea?

MPLS in Private Networks Is It a Good Idea? MPLS in Private Networks Is It a Good Idea? Jim Metzler Vice President Ashton, Metzler & Associates March 2005 Introduction The wide area network (WAN) brings indisputable value to organizations of all

More information

HP Networking BGP and MPLS technology training

HP Networking BGP and MPLS technology training Course overview HP Networking BGP and MPLS technology training (HL046_00429577) The HP Networking BGP and MPLS technology training provides networking professionals the knowledge necessary for designing,

More information

How To Understand The Benefits Of An Mpls Network

How To Understand The Benefits Of An Mpls Network NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 Introduction MPLS in the Enterprise Multi-Protocol Label Switching (MPLS) as a technology has been around for over a decade

More information

Introduction to MPLS-based VPNs

Introduction to MPLS-based VPNs Introduction to MPLS-based VPNs Ferit Yegenoglu, Ph.D. ISOCORE [email protected] Outline Introduction BGP/MPLS VPNs Network Architecture Overview Main Features of BGP/MPLS VPNs Required Protocol Extensions

More information

CONFIGURATION OPTIONS FOR HARDWARE RULE SEARCH (RMS) AND SOFTWARE RULE SEARCH (SWRS)

CONFIGURATION OPTIONS FOR HARDWARE RULE SEARCH (RMS) AND SOFTWARE RULE SEARCH (SWRS) APPLICATION NOTE CONFIGURATION OPTIONS FOR HARDWARE RULE SEARCH (RMS) AND SOFTWARE RULE SEARCH (SWRS) Discover Which Juniper Networks ScreenOS Rule Search Works for Your Network Copyright 2010, Juniper

More information

MPLS Concepts. Overview. Objectives

MPLS Concepts. Overview. Objectives MPLS Concepts Overview This module explains the features of Multi-protocol Label Switching (MPLS) compared to traditional ATM and hop-by-hop IP routing. MPLS concepts and terminology as well as MPLS label

More information

Virtual Private LAN Service

Virtual Private LAN Service Virtual Private LAN Service Authors Kireeti Kompella, Juniper Networks, 1194 N Mathilda Avenue, Sunnyvale, CA 94089, USA E-mail : [email protected] Jean-Marc Uzé, Juniper Networks, Espace 21, 31 Place

More information

Introduction to HA Technologies: SSO/NSF with GR and/or NSR. Ken Weissner / [email protected] Systems and Technology Architecture, Cisco Systems

Introduction to HA Technologies: SSO/NSF with GR and/or NSR. Ken Weissner / kweissne@cisco.com Systems and Technology Architecture, Cisco Systems Introduction to HA Technologies: SSO/NSF with GR and/or NSR. Ken Weissner / [email protected] Systems and Technology Architecture, Cisco Systems 1 That s a lot of acronyms Some definitions HA - High Availability

More information

VMWARE VIEW WITH JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES

VMWARE VIEW WITH JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES APPLICATION NOTE VMWARE VIEW WITH JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES Configuring Secure SSL VPN Access in a VMware Virtual Desktop Environment Copyright 2010, Juniper Networks, Inc. 1 Table

More information

How To Fix Bg Convergence On A Network With A Bg-Pic On A Bgi On A Pipo On A 2G Network

How To Fix Bg Convergence On A Network With A Bg-Pic On A Bgi On A Pipo On A 2G Network 1 BGP Prefix Independent Convergence draft-rtgwg-bgp-pic-00 Authors :, Cisco Systems Presenter : Clarence Filsfils, Cisco Systems Pradosh Mohapatra, Cisco Systems IETF85, Nov/2012 Atlanta, USA 2 Agenda

More information

Real-Time Traffic Engineering Management With Route Analytics

Real-Time Traffic Engineering Management With Route Analytics Real-Time Traffic Engineering Management With Route Analytics Executive Summary Increasing numbers of service providers and mobile operators are using RSVP-TE based traffic engineering to provide bandwidth

More information

- Multiprotocol Label Switching -

- Multiprotocol Label Switching - 1 - Multiprotocol Label Switching - Multiprotocol Label Switching Multiprotocol Label Switching (MPLS) is a Layer-2 switching technology. MPLS-enabled routers apply numerical labels to packets, and can

More information

MPLS-based Layer 3 VPNs

MPLS-based Layer 3 VPNs MPLS-based Layer 3 VPNs Overall objective The purpose of this lab is to study Layer 3 Virtual Private Networks (L3VPNs) created using MPLS and BGP. A VPN is an extension of a private network that uses

More information

November 2013. Defining the Value of MPLS VPNs

November 2013. Defining the Value of MPLS VPNs November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do

More information

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs A Silicon Valley Insider MPLS VPN Services PW, VPLS and BGP MPLS/IP VPNs Technology White Paper Serge-Paul Carrasco Abstract Organizations have been demanding virtual private networks (VPNs) instead of

More information

NETWORK AND SECURITY MANAGER APPLIANCES (NSMXPRESS AND NSM3000)

NETWORK AND SECURITY MANAGER APPLIANCES (NSMXPRESS AND NSM3000) DATASHEET NETWORK AND SECURITY MANAGER APPLIANCES ( AND ) Product Overview Now more than ever, network operators need the ability to easily manage security policies and to have visibility into potential

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Virtual Router Use Case for Educational Networks Published: 2014-01-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Reasons to Choose the Juniper ON Enterprise Network

Reasons to Choose the Juniper ON Enterprise Network Reasons to Choose the Juniper ON Enterprise Network Juniper s enterprise access products meet the always-on needs of today s enterprises by delivering solutions that are reliable, simple, and smart. The

More information

s@lm@n Cisco Exam 400-201 CCIE Service Provider Written Exam Version: 7.0 [ Total Questions: 107 ]

s@lm@n Cisco Exam 400-201 CCIE Service Provider Written Exam Version: 7.0 [ Total Questions: 107 ] s@lm@n Cisco Exam 400-201 CCIE Service Provider Written Exam Version: 7.0 [ Total Questions: 107 ] Cisco 400-201 : Practice Test Question No : 1 Which two frame types are correct when configuring T3 interfaces?

More information

JUNOScope IP Service Manager

JUNOScope IP Service Manager Datasheet JUNOScope IP Service Manager Product Description As service providers and enterprises evolve to meet the demands of their customer base, one key to success is the enhancement of operational efficiencies

More information

CLOS IP FABRICS WITH QFX5100 SWITCHES

CLOS IP FABRICS WITH QFX5100 SWITCHES White Paper CLOS IP FABRICS WITH QFX5100 SWITCHES Building Flexible, Programmable Data Center Networks Using Layer 3 Protocols and Overlay Networking Copyright 2014, Juniper Networks, Inc. 1 Table of Contents

More information

Tackling the Challenges of MPLS VPN Testing. Todd Law Product Manager Advanced Networks Division

Tackling the Challenges of MPLS VPN Testing. Todd Law Product Manager Advanced Networks Division Tackling the Challenges of MPLS VPN ing Todd Law Product Manager Advanced Networks Division Agenda Background Why test MPLS VPNs anyway? ing Issues Technical Complexity and Service Provider challenges

More information

Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications

Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications Best Effort gets Better with MPLS Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications A White Paper on Multiprotocol Label Switching October,

More information

HPSR 2002 Kobe, Japan. Towards Next Generation Internet. Bijan Jabbari, PhD Professor, George Mason University

HPSR 2002 Kobe, Japan. Towards Next Generation Internet. Bijan Jabbari, PhD Professor, George Mason University HPSR 2002 Kobe, Japan Towards Next Generation Internet Bijan Jabbari, PhD Professor, George Mason University May 28, 2002 Overview! Scalability and Interoperability in Internet! Impediments in Deployment

More information

MPLS L2VPN (VLL) Technology White Paper

MPLS L2VPN (VLL) Technology White Paper MPLS L2VPN (VLL) Technology White Paper Issue 1.0 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

MPLS Pseudowire Innovations: The Next Phase Technology for Today s Service Providers

MPLS Pseudowire Innovations: The Next Phase Technology for Today s Service Providers MPLS Innovations: The Next Phase Technology for Today s Service Providers Introduction MPLS technology enables a smooth evolution of core networks within today s service provider infrastructures. In particular,

More information

JUNIPER CARE PLUS ADVANCED SERVICES CREDITS

JUNIPER CARE PLUS ADVANCED SERVICES CREDITS DATASHEET JUNIPER CARE PLUS ADVANCED SERVICES CREDITS Service Overview Today s organizations are under constant pressure to meet dynamic market demands while increasing their return on investment. IT departments

More information

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite WHITE PAPER Mobile Device Security in the Enterprise Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite Copyright 2010, Juniper Networks, Inc. Table of Contents

More information

BUILDING MULTI-GENERATION SCALABLE NETWORKS WITH END-TO-END MPLS

BUILDING MULTI-GENERATION SCALABLE NETWORKS WITH END-TO-END MPLS White Paper BUILDING MULTI-GERATION SALABLE NETWORKS WITH D-TO-D MPLS Juniper Enables Service Flexibility and Scalability with Seamless MPLS opyright 2012, Juniper Networks, Inc. 1 Table of ontents Executive

More information

MPLS - A Choice of Signaling Protocol

MPLS - A Choice of Signaling Protocol www.ijcsi.org 289 MPLS - A Choice of Signaling Protocol Muhammad Asif 1, Zahid Farid 2, Muhammad Lal 3, Junaid Qayyum 4 1 Department of Information Technology and Media (ITM), Mid Sweden University Sundsvall

More information

Fast Reroute for Triple Play Networks

Fast Reroute for Triple Play Networks Building Smart Broadband Networks TM Fast Reroute for Triple Play Networks Sachin Natu Product Management March 2006 IPTV Service Requirements IPTV Network Design Fast Reroute / Convergence Solutions -

More information

JUNOS Software: The Power

JUNOS Software: The Power PRODUCT CATEGORY BROCHURE JUNOS Software: The Power of One Operating System Reduce Complexity, Achieve Operational Excellence, and Dynamically Deliver Services with Lower TCO Overview Juniper Networks

More information

PRODUCT CATEGORY BROCHURE. Juniper Networks SA Series

PRODUCT CATEGORY BROCHURE. Juniper Networks SA Series PRODUCT CATEGORY BROCHURE Juniper Networks SA Series SSL VPN Appliances Juniper Networks SA Series SSL VPN Appliances Lead the Market with Secure Remote Access Solutions That Meet the Needs of Organizations

More information

Implementing Firewalls inside the Core Data Center Network

Implementing Firewalls inside the Core Data Center Network Implementation Guide Implementing Firewalls inside the Core Data Center Network Best Practices for Implementing Juniper Networks Firewall Devices in the Data Center Core Juniper Networks, Inc. 1194 North

More information

WEB FILTERING FOR BRANCH SRX SERIES AND J SERIES

WEB FILTERING FOR BRANCH SRX SERIES AND J SERIES APPLICATION NOTE WEB FILTERING FOR BRANCH SRX SERIES AND J SERIES Configuring Web Filtering on Branch SRX Series Services Gateways and J Series Services Routers Copyright 2010, Juniper Networks, Inc. 1

More information

Enterprise Network Simulation Using MPLS- BGP

Enterprise Network Simulation Using MPLS- BGP Enterprise Network Simulation Using MPLS- BGP Tina Satra 1 and Smita Jangale 2 1 Department of Computer Engineering, SAKEC, Chembur, Mumbai-88, India [email protected] 2 Department of Information Technolgy,

More information

DEMYSTIFYING ROUTING SERVICES IN SOFTWAREDEFINED NETWORKING

DEMYSTIFYING ROUTING SERVICES IN SOFTWAREDEFINED NETWORKING DEMYSTIFYING ROUTING SERVICES IN STWAREDEFINED NETWORKING GAUTAM KHETRAPAL Engineering Project Manager, Aricent SAURABH KUMAR SHARMA Principal Systems Engineer, Technology, Aricent DEMYSTIFYING ROUTING

More information

Secure, Mobile Access to Corporate Email, Applications, and Intranet Resources

Secure, Mobile Access to Corporate Email, Applications, and Intranet Resources APPLICATION NOTE Juniper NETWORKS SSL VPN and Windows Mobile Secure, Mobile Access to Corporate Email, Applications, and Intranet Resources Table of Contents Introduction.........................................................................................

More information

MPLS WAN Explorer. Enterprise Network Management Visibility through the MPLS VPN Cloud

MPLS WAN Explorer. Enterprise Network Management Visibility through the MPLS VPN Cloud MPLS WAN Explorer Enterprise Network Management Visibility through the MPLS VPN Cloud Executive Summary Increasing numbers of enterprises are outsourcing their backbone WAN routing to MPLS VPN service

More information

SECURE ACCESS TO THE VIRTUAL DATA CENTER

SECURE ACCESS TO THE VIRTUAL DATA CENTER SOLUTION BRIEF SECURE ACCESS TO THE VIRTUAL DATA CENTER Ensure that Remote Users Can Securely Access the Virtual Data Center s Virtual Desktops and Other Resources Challenge VDI is driving a unique need

More information

The Complete IS-IS Routing Protocol

The Complete IS-IS Routing Protocol Hannes Gredler and Walter Goralski The Complete IS-IS Routing Protocol 4y Springer Contents Foreword Credits and Thanks vii ix 1 Introduction, Motivation and Historical Background 1 1.1 Motivation 1 1.2

More information

How Routers Forward Packets

How Routers Forward Packets Autumn 2010 [email protected] MULTIPROTOCOL LABEL SWITCHING (MPLS) AND MPLS VPNS How Routers Forward Packets Process switching Hardly ever used today Router lookinginside the packet, at the ipaddress,

More information

MIGRATING IPS SECURITY POLICY TO JUNIPER NETWORKS SRX SERIES SERVICES GATEWAYS

MIGRATING IPS SECURITY POLICY TO JUNIPER NETWORKS SRX SERIES SERVICES GATEWAYS APPLICATION NOTE MIGRATING IPS SECURITY POLICY TO JUNIPER NETWORKS SRX SERIES SERVICES GATEWAYS Migrating Advanced Security Policies to SRX Series Services Gateways Copyright 2009, Juniper Networks, Inc.

More information

IxNetwork TM MPLS-TP Emulation

IxNetwork TM MPLS-TP Emulation IxNetwork TM MPLS-TP Emulation Test the Functionality, Performance, and Scalability of an MPLS-TP Ingress, Egress, or Transit Node MPLS has come a long way since its original goal to allow core routers

More information

Testing Edge Services: VPLS over MPLS

Testing Edge Services: VPLS over MPLS Testing Edge Services: VPLS over MPLS White Paper Introduction Virtual Private LAN Services (VPLS) is an emerging technology for transparently connecting corporate LANs over the Internet so they appear

More information

WHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January 2008. Introduction...

WHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January 2008. Introduction... Introduction WHITE PAPER Addressing Inter Provider Connections with MPLS-ICI The migration away from traditional multiple packet overlay networks towards a converged packet-switched MPLS system is now

More information

DD2491 p2 2011. MPLS/BGP VPNs. Olof Hagsand KTH CSC

DD2491 p2 2011. MPLS/BGP VPNs. Olof Hagsand KTH CSC DD2491 p2 2011 MPLS/BGP VPNs Olof Hagsand KTH CSC 1 Literature Practical BGP: Chapter 10 MPLS repetition, see for example http://www.csc.kth.se/utbildning/kth/kurser/dd2490/ipro1-11/lectures/mpls.pdf Reference:

More information

Junos MPLS and VPNs (JMV)

Junos MPLS and VPNs (JMV) Junos MPLS and VPNs (JMV) Course No: EDU-JUN-JMV Length: Five days Onsite Price: $32500 for up to 12 students Public Enrollment Price: $3500/student Course Level JMV is an advanced-level course. Prerequisites

More information

The Essential Guide to Deploying MPLS for Enterprise Networks

The Essential Guide to Deploying MPLS for Enterprise Networks White Paper The Essential Guide to Deploying MPLS for Enterprise Networks Daniel Backman Systems Engineer Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale,

More information

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more

More information

Cisco Configuring Basic MPLS Using OSPF

Cisco Configuring Basic MPLS Using OSPF Table of Contents Configuring Basic MPLS Using OSPF...1 Introduction...1 Mechanism...1 Hardware and Software Versions...2 Network Diagram...2 Configurations...2 Quick Configuration Guide...2 Configuration

More information

MPLS Traffic Engineering in ISP Network

MPLS Traffic Engineering in ISP Network MPLS Traffic Engineering in ISP Network Mohsin Khan Birmingham City University, England ABSTRACT Multi Protocol Label Switching (MPLS) is an innovative and vibrant technology. The most famous applications

More information