MPLS for Dummies. Richard A Steenbergen <[email protected]> nlayer Communications, Inc.
|
|
|
- Madison Ball
- 10 years ago
- Views:
Transcription
1 MPLS for Dummies Richard A Steenbergen <[email protected]> nlayer Communications, Inc. 1
2 Purpose of This Tutorial There are lot of IP people out there who still don t like MPLS. Many of the concepts are completely foreign to pure IP networks. Many parts of MPLS smell like ATM, a technology which did a lot of things wrong as it was applied to the IP world. Many aspects of MPLS could be called overly complicated, or at least have been presented in an overly complicated way in the past. Even networks who claim to run MPLS networks often have only the most basic features turned on, and may not fully utilize it. But, MPLS can be a powerful tool for any network. It s not just for the buzzword compliant or the crazy telco-heads. With any luck, this tutorial should: Introduce the concepts of MPLS for people who are new to it. Show you how MPLS can help you run your network better. 2
3 Target Audience 3
4 MPLS Isn t ATM 2.0, I Promise 4
5 The Basics 5
6 What is MPLS? MPLS stands for Multi-Protocol Label Switching. MPLS is best summarized as a Layer 2.5 networking protocol. In the traditional OSI model: Layer 2 covers protocols like Ethernet and SONET, which can carry IP packets, but only over simple LANs or point-to-point WANs. Layer 3 covers Internet-wide addressing and routing using IP protocols. MPLS sits between these traditional layers, providing additional features for the transport of data across the network. 6
7 What is Label Switching? In a traditional IP network: Each router performs an IP lookup ( routing ), determines a next-hop based on its routing table, and forwards the packet to that next-hop. Rinse and repeat for every router, each making its own independent routing decisions, until the final destination is reached. MPLS does label switching instead: The first device does a routing lookup, just like before: But instead of finding a next-hop, it finds the final destination router. And it finds a pre-determined path from here to that final router. The router applies a label (or shim ) based on this information. Future routers use the label to route the traffic Without needing to perform any additional IP lookups. At the final destination router the label is removed. And the packet is delivered via normal IP routing. 7
8 What is the Advantage of Label Switching? Originally, it was intended to reduce IP routing lookups. When CIDR was introduced, it had unintended consequences. CIDR introduced the concept of longest prefix matching for IP routing. Longest prefix match lookups have historically been very difficult to do. The classic software algorithm for routing lookups was called a PATRICIA trie, which required many memory accesses just to route a single packet. Exact matches were comparatively much easier to implement in hardware. Most early hardware routing cheated by doing the first lookup in software, then did hardware-based exact matching for future packets in the flow. Label switching (or tag switching ) lookups use exact matching. The idea was to have only the first router do an IP lookup, then all future routes in the network could do exact match switching based on a label. This would reduce load on the core routers, where high-performance was the most difficult to achieve, and distribute the routing lookups across lower speed edge routers. 8
9 What is the Advantage of Label Switching? Modern ASICs have eliminated this issue Mostly. Today, commodity ASICs can do many tens of millions of IP routing lookups per second, relatively cheaply and easily. However, they still make up a significant portion of the cost of a router. Exact matching is still much cheaper and easier to implement. A layer 2 only Ethernet switch (which does exact matching) may be 1/4 th the cost and 4x the capacity of a similar device with layer 3 capabilities. So why do people still care about MPLS? Three reasons: Implementing Traffic-Engineering The ability to control where and how traffic is routed on your network, to manage capacity, prioritize different services, and prevent congestion. Implementing Multi-Service Networks The ability to deliver data transport services, as well as IP routing services, across the same packet-switched network infrastructure. Improving network resiliency with MPLS Fast Reroute. 9
10 How MPLS Works 10
11 How MPLS Works Basic Concepts MPLS Label Switched Path ( LSP ) One of the most important concepts for the actual use of MPLS. Essentially a unidirectional tunnel between a pair of routers, routed across an MPLS network. An LSP is required for any MPLS forwarding to occur. MPLS Router Roles/Positions Label Edge Router ( LER ) or ingress node. The router which first encapsulates a packet inside an MPLS LSP. Also the router which makes the initial path selection. Label Switching Router ( LSR ) or transit node A router which only does MPLS switching in the middle of an LSP. Egress Node The final router at the end of an LSP, which removes the label. By Richard Steenbergen, nlayer Communications, Inc. 11
12 How MPLS Works Basic Concepts MPLS router roles may also be expressed as P or PE : Terms which come from the description of VPN services. P Provider Router A core/backbone router which is doing label switching only. A pure P router can operate without any customer/internet routes at all. This is common in large service provider networks. PE Provider Edge Router A customer facing router which does label popping and imposition. Typically has various edge features for terminating multiple services: Internet L3VPN L2VPN / Pseudowires VPLS CE is the Customer Edge, the customer device a PE router talks to. By Richard Steenbergen, nlayer Communications, Inc. 12
13 MPLS Signaling Protocols To use an LSP, it must be signaled across your routers. An LSP is a network-wide tunnel, but a label is only a link-local value. An MPLS signaling protocol maps LSPs to specific label values. There are two main MPLS routing protocols in use today: Label Distribution Protocol ( LDP ) A simple non-constrained (doesn t support traffic engineering) protocol. Resource Reservation Protocol with Traffic Engineering ( RSVP-TE ) A more complex protocol, with more overhead, but which also includes support for traffic-engineering via network resource reservations. Most complex networks will actually need to use both protocols. LDP is typically used by MPLS VPN (data transport) services. But RSVP-TE is necessary for traffic engineering features. Most networks will configure LDP to tunnel inside RSVP. 13
14 MPLS Label Stacking MPLS labels can also be stacked multiple times. The top label is used to control the delivery of the packet. When destination is reached, the top label is removed (or popped ), and the second label takes over to direct the packet further. Some common stacking applications are: VPN/Transport services, which use an inner label to map traffic to specific interfaces, and an outer label to route through the network. Bypass LSPs, which can protect a bundle of other LSPs to redirect traffic quickly without having to completely re-signal every LSP, in the event of a router failure. 14
15 Penultimate Hop Popping There are two ways to terminate an LSP: Implicit Null Also called Penultimate Hop Popping (PHP). Just a long way of saying remove the label on the next-to-last hop. Explicit Null Preserve the label all the way to the very last router. What s the difference? Implicit null is an optimization technique. Since the label is already removed on the next-to-last router, the last router can more easily begin to route the packet after it exits the LSP. Otherwise, the packet has to make two trips through the last router. One pass through the forwarding path to pop the label. Another pass to route the packet based on the underlying information. 15
16 Vendor Terminology Warning Cisco and Juniper both use somewhat confusing terms to describe the same thing. Example: Cisco Affinities Juniper Admin-Groups Cisco Autoroute Announce Juniper TE Shortcuts Cisco Forwarding Adjacency Juniper LSP-Advertise Cisco Tunnel Juniper LSP Cisco Make-Before-Break Juniper Adaptive Cisco Application-Window Juniper Adjust-Interval Cisco Shared Risk Link Groups Juniper Fate-Sharing 16
17 MPLS Traffic Engineering 17
18 What is Traffic Engineering What is Traffic Engineering? Classic IGPs use non-te routing, i.e. a metric (cost) per link, and a shortest path first (SPF) algorithm to find the shortest path. Traffic Engineering takes this, and adds additional constraints. For example, find the shortest path that also has available bandwidth. This is also called constrained routing, using a CSPF algorithm. The principal is simple: It is better to take an uncongested path even though the latency may be higher, than to congest the shortest path on one link while leaving available bandwidth unused on another link. Why can t I just do this manually with my IGP costs? You can, but this only scales up to a certain point. As networks become more complex, this gets harder to manage. Changing an IGP cost by 1 can easily affect routing dozens of hops away. 18
19 How to Route from Los Angeles to Chicago 19
20 How to Route from Los Angeles to Chicago Path 1 20
21 How to Route from Los Angeles to Chicago Path 1 Path 2 21
22 How to Route from Los Angeles to Chicago Path 1 Path 2 Path 3 22
23 How to Route from Los Angeles to Chicago Path 1 Path 2 Path 3 Path 4 23
24 How Does MPLS Traffic Engineering Work? Using RSVP-TE to reserve bandwidth across the network. Remember, an LSP is a tunnel between two points in the network. Under RSVP, each LSP has a bandwidth value associated with it. Using constrained routing, RSVP-TE looks for the shortest path with enough available bandwidth to carry a particular LSP. If bandwidth is available, the LSP is signaled across a set of links. The LSP bandwidth is removed from the available bandwidth pool. Future LSPs may be denied if there is insufficient bandwidth. They ll ideally be routed via some other path, even if the latency is higher. Existing LSPs may be preempted for new higher priority LSPs. You can create higher and lower priority LSPs, and map certain customers or certain traffic onto each one. This isn t traditional QoS, no packets are being dropped when bandwidth isn t available, you re simply giving certain traffic access to shorter paths. 24
25 How RSVP-TE Reserves Bandwidth PATH message 20Mbps R1 R R R6 R R4 R Pop R9 R5 RESV message 22 RSVP PATH: R1 R2 R6 R7 R4 R9 RSVP RESV: Returns labels and reserves bandwidth Bandwidth available on each link Label value returned via RESV message 25
26 How Do You Determine an LSP Bandwidth? How do you determine the bandwidth of particular LSP? After all, IP networks are dynamic and packet switched. Bandwidth use can change in and instant, and be unpredictable. There are basically two main ways to do it: Offline Calculation Calculation which occurs outside of the router, typically based on some bandwidth modeling, and often using a third party script or tool. This is how MPLS was first implemented, and is still commonly used today by most large networks and early MPLS adopters. Auto-Bandwidth The bandwidth value is calculated on the router, by periodically measuring how much traffic is actually forwarding over the LSP. The RSVP reservation is then periodically updated with the new number. 26
27 LSP Bandwidth More Often is Better 24 Hour Adjust Interval Adjust Interval Adjust Interval Adjust Interval 1.5 Hour Adjust Interval More Efficient Bandwidth Use 27
28 Offline Calculation vs. Auto-Bandwidth Offline Calculation You can implement any algorithm you d like. Some extremely complex LSP modeling software is available from 3 rd party vendors, allowing you to do detailed LSP planning. But you either have to write the software yourself, or buy it. Auto-Bandwidth Because it runs directly on the router, it can respond to changing traffic conditions much more rapidly, with less overhead. Most offline calculations are based expectations of stable traffic patterns. Unusual traffic spikes can cause congestion or inefficient bandwidth use. Easier to implement (just turn the knob on your router, it s free). 28
29 MPLS Data Transport Services 29
30 MPLS Pseudowires Layer 2 Pseudowire or VLL (Virtual Leased Line) An emulated layer-2 point-to-point circuit, delivered over MPLS. Currently standardized by the PWE3 IETF Working Group. Can be used to interconnect two different types of media: For example, Ethernet to Frame Relay. Useful for migrating legacy transport (e.g. ATM) to an MPLS network. Can be difficult to load balance, due to lack of visibility into the packet. The payload is unknown, so you can t hash on the IP header inside, etc. Historically two competing methods for signaling: LDP-signaled / Draft Martini The simpler of the two methods, and more commonly implemented. BGP-signaled / Draft Kompella / L2VPN More complex, but with auto-discovery support for multi-point. 30
31 MPLS L3VPNs L3VPN An IP based VPN. Networks build virtual routing domains (VRFs) on their edge routers. Customers are placed within a VRF, and exchange routes with the provider router in a protected routing-instance, usually BGP or IGP. Can support complex topologies and interconnect many sites. Usually load-balancing hash friendly (has exposed IP headers). But can add a significant load to the service provider infrastructure. Since the PE device must absorb the customer s routing table, consuming RIB and FIB capacity. Typically seen in more enterprise environments. Signaled via BGP within the provider network. 31
32 MPLS VPLS VPLS (Virtual Private LAN Service) Creates an Ethernet multipoint switching service over MPLS. Used to link a large number of customer endpoints in a common broadcast domain. Avoids the need to provision a full mesh of L2 circuits. Emulates the basic functions of a layer 2 switch: Unknown unicast flooding Mac learning Broadcasts Typically load-balancing friendly since the L2 Ethernet headers are examined and used, unlike L2 pseudowires where they are passed transparently. 32
33 MPLS Fast Reroute 33
34 What Does Fast Reroute Do? MPLS Fast Reroute improves convergence during a failure. By pre-calculating backup paths for potential link or node failures. In a normal IP network The best path calculation happens on-demand when a failure is detected. It can take several seconds to recalculate best paths and push those changes to the router hardware, particularly on a busy router. A transient routing loop may also occur, as every router in the networks learns about the topology change. With MPLS Fast Reroute The next best path calculation happens before the failure actually occurs. The backup paths are pre-programmed into the router FIB awaiting activation, which can happen in milliseconds following failure detection. Because the entire path is set within the LSP, routing loops cannot occur during convergence, even if the path is briefly suboptimal. 34
35 MPLS Protection Schemes There are two different ways to provide LSP protection: One-to-One Protection / Detour An individual backup path is fully signaled through RSVP for every LSP, at every point where protection is provided (i.e. every node). The label depth remains at 1, but this can involve a huge number of reservations, and can cause significant overhead. Many-to-One Protection / Facility Backup A single bypass LSP is created between two nodes to be protected. During a failure, multiple LSPs are rerouted over the bypass LSP. Also different types of failures that can be protected against: Link Protection / Next-Hop Backup A bypass LSP is created for every possible link failure. Node Protection / Next-Next-Hop Backup A bypass LSP is created for every possible node (router) failure 35
36 MPLS With No Protection R1 R2 R3 R4 R5 36
37 MPLS Link Protection R1 R2 R3 R4 R5 37
38 MPLS Node Protection R1 R2 R3 R4 R5 38
39 MPLS Link and Node Protection R1 R2 R3 R4 R5 39
40 MPLS Auto-Bandwidth 40
41 How Does Auto-Bandwidth Work? Technically each algorithm is router/vendor independent. But both Cisco and Juniper implement it in much the same way. Auto-Bandwidth performs the following basic steps. 1. Every Statistics Interval, bandwidth over an LSP is measured. For example, you might configure this to every 60 seconds. 2. Every Adjust Interval, the largest sample from the process above is used to calculate the new LSP bandwidth. For example, you might use 5 samples and adjust every 300 seconds. 3. If the change is larger than a user configured minimum threshold, the new bandwidth value is re-signaled across RSVP. Ideally using a make-before-break configuration. 41
42 When Auto-Bandwidth Works Well When Auto-BW Works Well BW Resv BW Resv
43 When Auto-Bandwidth Doesn t Work Well When Auto-BW May Not Work So Well BW Resv BW Resv
44 Overflow and Underflow Another common optimization is Overflow and Underflow. This logic says: If a certain number of Statistics Samples exceed a certain % difference, kick off an Adjust event before the normal time. Instead of having a low Adjust Interval, you can have a higher interval, and allow on Overflow/Underflow to detect significant changes to the % of bandwidth used. This can help catch major bandwidth changes such as during failure events or sudden traffic spikes. Warning: Not every vendor supports Underflow If traffic shifts from one LSP to another, Overflow may catch the increase of traffic on the new LSP, but without Underflow you won t catch the decrease in traffic on the old LSP until the next adjust interval. This can lead to suboptimal routing, or even failure to signal the LSP at all, if the network cannot find bandwidth for both LSPs simultaneously. 44
45 More MPLS Details 45
46 RSVP-TE LSP Priorities LSPs have the ability to preempt each other to acquire available bandwidth based upon a defined priority value. Each LSP has a SETUP and a HOLD priority. SETUP is the priority value defined when the tunnel is establishing. HOLD is the priority value defined when a tunnel has already been setup. 8 priority values are available (0-7), 0 having the highest priority. Two types of preemption on routers: Hard Soft LSP is torn down in a disruptive manner. Gives the LSP to be preempted time (usually tens of seconds configurable) to find a new path and tear itself down. Mostly non-disruptive. 46
47 MPLS Preemption Example - Before LSP from Joel to Shima with a HOLD priority of 5 and 7Gbps 47
48 MPLS Preemption Example - After LSP from Terry to Shima with a SETUP priority of 3 and 4Gbps 48
49 LSP Optimization Over time, network topologies can change. IGP cost changes, new links, failed links, etc. The optimization process will re-compute the LSP paths. Normally reoptimization is a periodic process that operates in the background, looking for a better path for one or all LSPs. It can also be triggered manually if necessary. If a better path is found, the router will attempt to rebuild the LSP on the new path. Many routers can do smart optimization. For example, a link coming back up can trigger an optimization event before the normal timer. But only once, to prevent a flapping link from going nuts. 49
50 Make Before Break / Adaptive LSPs When an LSP is re-signaled for any reason, the old LSP is completely torn down, and a new one is built in its place. Reoptimization, bandwidth reservation updating, etc. To avoid traffic disruption, a make-before-break option fully signals the new LSP before tearing down the old one. But this may cause transient double-counting of bandwidth. When the old and new LSPs share the same path, double counting can be avoided. But if the paths are different, the LSP bandwidth may be reserved twice. 50
51 Using an LSP for your IP Traffic Now that you have these LSPs, how do you use them for IP? Static Routes Not very practical, though these can be useful in some limited scenarios. Handy way to do some quick and dirty traffic engineering for a prefix. Juniper TE Shortcuts / Cisco Autoroute Announce Let the local router use MPLS LSPs as next-hops for BGP/IGP routes. Cisco implements this transparently by modifying the SPF algorithm, Juniper adds the LSPs to the inet.3 table, but the result is the same. Since this is a local router feature, it can be enabled or disabled on specific routers, and is not advertised to other routers. Even if the destination endpoint doesn t speak MPLS, the LSP that goes to the last MPLS speaking router along the path will be used. 51
52 IGP-Shortcut / Autoroute Announce P1 -> P3 LSP P1 -> P2 and P1 ->P7 52
53 MPLS and Traceroute MPLS can also let you hide traceroute hops. Since you aren t actually doing IP forwarding, there is no need to decrement the IP TTL field as you MPLS forward the packet. And if you don t, the LSP shows up as a single hop in traceroute. Some networks prefer this behavior, as it hides the internals of their network, and makes for shorter / prettier traceroutes. Some networks also run MPLS-only cores, which carry no IP routes. This presents a problem, since if they did want to show the hops in traceroute, the router can t do IP routing to return the ICMP TTL Exceed. To solve this problem, an icmp tunneling feature was implemented. If an ICMP message is generated inside an LSP, the ICMP message is carried all the way to the end of the LSP before being routed back. This can make traceroute look really weird, since you see all the hops along the LSP, but they all appear to have the same latency as the final hop. This causes much end-user confusion. 53
54 Link Coloring (Affinities / Admin-Groups) An additional constraint in the CSPF algorithm. Allows for 32 unique color markings that can be placed on a link. Multiple color markings can be applied on a link. Link colors are advertised as a link attribute. Periodically flooded out just like Bandwidth information. The operator can use these markings in any way they wish. This is creat for specifying: Geographic / Political boundaries Prefer to keep traffic routing within a specific country/region/continent Cost-Out/Maintenance Activities Can instruct all LSPs to immediately move off a path Prevent traffic from traversing specific links/paths Don t have core-to-core LSPs traverse edge routers or metro networks 54
55 SRLG - Shared Risk Link Groups By default, backup paths may not provide full redundancy. For example, the next best path that goes into fast reroute may ride on the same transport equipment, physical path, conduit, etc. If both paths fail simultaneously, you don t get a fast reroute. SRLGs let you define links that share common risks. This can then be used to force backup paths to use different SRLG links, even if the backup path is less optimal by IGP cost. 55
56 SRLG - Shared Risk Link Groups Layer 1 Example New York Cleveland 56
57 SRLG - Shared Risk Link Groups Solution Build a backup path that avoids the SRLG PE Main LSP PE St. Louis Chicago Cleveland Bypass LSP New York Backup Path Tunnel Logic applied from Chicago -> NY Exclude Chicago->NY Link Exclude Chicago->Cleveland Constrained SPF instructs us to then select the shortest path from Chicago to NYC: Chicago -> Atlanta -> NY Atlanta 57
58 The Downsides of MPLS 58
59 The Downsides of MPLS No protocol is perfect, MPLS least of all. One major drawback is that it hides suboptimal topologies from BGP, where multiple exits may exist for the same route. For example: Say you peer with a major network in San Jose and Los Angeles. Traffic coming from Chicago would normally go directly to San Jose. But because of a capacity issue, the LSP is forced to go via Los Angeles first. In an IP network, the packet would probably be diverted to the local Los Angeles peer as it passes through Los Angeles. But MPLS will hide the suboptimal topology, the packet will continue to San Jose because that s what Chicago saw as the best exit. This can be a good or a bad thing depending on your goals. 59
60 MPLS Blocks Use of a Second Exit ebgp Peer Preferred Path Next Best Path 60
61 MPLS LSPs Don t Create Themselves Unlike other protocols, MPLS isn t entirely auto-magic. There are no protocols to auto-discover MPLS speaking nodes. The MPLS protocols just exchange label values for an LSP. They have no involvement with the creation of the LSPs. Building the full mesh of LSP tunnels is left up to the operator. Essentially this means operator supplied scripts are a necessity. Or else an operator purchased commercial software solution. Examples include WANDL, Cariden, etc. Some vendors offer some very basic Auto-Mesh capabilities. For example, Cisco can auto-create a mesh of LSPs from a template, using a list of router IPs supplied in an access-list. But this leaves you no way to control a specific LSP configuration. Oh and if you want to remove a node from the mesh you have to remove the entire ACL, bringing down every dynamic auto-mesh LSP on the box. 61
62 Large LSPs Can t Fit Down Small Pipes An LSP can only be moved as an atomic unit. So if you have relatively large LSPs relative to the size of the circuits they re traversing, you may not be able to efficiently pack them. For example, say you have (3) 6 Gbps LSPs and 2x10G circuits. You ll only be able to fit 2 of the 3 LSPs above. The other LSP will have to find another longer path, if one exists at all. And your 2 circuits will be left with 4 Gbps of unfilled capacity. Another example, say you have mixed OC192 and OC48 circuits. A 3 Gbps LSP will never be able to fit down an OC48 circuit. One workaround is to create multiple parallel LSPs Instead of having (3) 6 Gbps LSPs you could have (9) 2 Gbps LSPs. But so far no router vendor auto-mesh systems support parallel LSPs. Ideally you would want auto-bandwidth to fork an LSP doing > # BW But no vendor implementation can do this either. 62
63 The Gotchas of Auto-Bandwidth Auto-Bandwidth isn t perfect either. We ve already seen some examples of incorrect sizing. Auto-Bandwidth + Oversubscribed Links = Bad Things Auto-Bandwidth doesn t know anything about congestion on links. Say you oversubscribe a link, RSVP fills it, and you get packet drops. Drops cause TCP to throttle back, and the IP traffic rate goes down. Auto-Bandwidth adapts to this new rate, and thinks everything is fine. This leads to sustained congestion requiring manual intervention. Also, be careful if your router doesn t see L2 overhead. A 28 byte UDP flood consumes 84 bytes over the wire on Ethernet. A DoS attack of small packets can result in in congestion that is completely invisible to auto-bandwidth. 63
64 Send questions, comments, complaints to: Richard A Steenbergen [email protected]
MPLS RSVP-TE Auto-Bandwidth: Practical Lessons Learned. Richard A Steenbergen <[email protected]>
MPLS RSVP-TE Auto-Bandwidth: Practical Lessons Learned Richard A Steenbergen 1 MPLS RSVP-TE Quick Review MPLS Traffic Engineering 101 Classically, IGPs used only link cost to select a best
MPLS RSVP-TE Auto-Bandwidth: Practical Lessons Learned
MPLS RSVP-TE Auto-Bandwidth: Practical Lessons Learned Richard A Steenbergen nlayer Communications, Inc. 1 MPLS RSVP-TE Quick Review MPLS Traffic Engineering 101 Classically, IGPs used
Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS
Computer Network Architectures and Multimedia Guy Leduc Chapter 2 MPLS networks Chapter based on Section 5.5 of Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley,
MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs
A Silicon Valley Insider MPLS VPN Services PW, VPLS and BGP MPLS/IP VPNs Technology White Paper Serge-Paul Carrasco Abstract Organizations have been demanding virtual private networks (VPNs) instead of
IP/MPLS-Based VPNs Layer-3 vs. Layer-2
Table of Contents 1. Objective... 3 2. Target Audience... 3 3. Pre-Requisites... 3 4. Introduction...3 5. MPLS Layer-3 VPNs... 4 6. MPLS Layer-2 VPNs... 7 6.1. Point-to-Point Connectivity... 8 6.2. Multi-Point
Multi Protocol Label Switching (MPLS) is a core networking technology that
MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of
MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009
MikroTik RouterOS Introduction to MPLS Prague MUM Czech Republic 2009 Q : W h y h a v e n 't y o u h e a r d a b o u t M P LS b e fo re? A: Probably because of the availability and/or price range Q : W
Introducing Basic MPLS Concepts
Module 1-1 Introducing Basic MPLS Concepts 2004 Cisco Systems, Inc. All rights reserved. 1-1 Drawbacks of Traditional IP Routing Routing protocols are used to distribute Layer 3 routing information. Forwarding
Expert Reference Series of White Papers. An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire
Expert Reference Series of White Papers An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire 1-800-COURSES www.globalknowledge.com An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire Al Friebe,
How To Understand The Benefits Of An Mpls Network
NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 Introduction MPLS in the Enterprise Multi-Protocol Label Switching (MPLS) as a technology has been around for over a decade
Design of MPLS networks VPN and TE with testing its resiliency and reliability
MASARYK UNIVERSITY FACULTY OF INFORMATICS Design of MPLS networks VPN and TE with testing its resiliency and reliability Diploma thesis Michal Aron Brno, spring 2014 ZADANIE DP Declaration I declare
MPLS Concepts. Overview. Objectives
MPLS Concepts Overview This module explains the features of Multi-protocol Label Switching (MPLS) compared to traditional ATM and hop-by-hop IP routing. MPLS concepts and terminology as well as MPLS label
Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone
International Journal of Computer Science and Telecommunications [Volume 5, Issue 6, June 2014] 9 ISSN 2047-3338 Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone Mushtaq
Leveraging Advanced Load Sharing for Scaling Capacity to 100 Gbps and Beyond
Leveraging Advanced Load Sharing for Scaling Capacity to 100 Gbps and Beyond Ananda Rajagopal Product Line Manager Service Provider Solutions Foundry Networks [email protected] Agenda 2 Why Load
Project Report on Traffic Engineering and QoS with MPLS and its applications
Project Report on Traffic Engineering and QoS with MPLS and its applications Brief Overview Multiprotocol Label Switching (MPLS) is an Internet based technology that uses short, fixed-length labels to
WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr. 2006 Cisco Systems, Inc. All rights reserved.
MPLS WAN Topologies 1 Multiprotocol Label Switching (MPLS) IETF standard, RFC3031 Basic idea was to combine IP routing protocols with a forwarding algoritm based on a header with fixed length label instead
DD2491 p2 2011. MPLS/BGP VPNs. Olof Hagsand KTH CSC
DD2491 p2 2011 MPLS/BGP VPNs Olof Hagsand KTH CSC 1 Literature Practical BGP: Chapter 10 MPLS repetition, see for example http://www.csc.kth.se/utbildning/kth/kurser/dd2490/ipro1-11/lectures/mpls.pdf Reference:
Internetworking II: VPNs, MPLS, and Traffic Engineering
Internetworking II: VPNs, MPLS, and Traffic Engineering 3035/GZ01 Networked Systems Kyle Jamieson Lecture 10 Department of Computer Science University College London Taxonomy of communica@on networks Virtual
Junos MPLS and VPNs (JMV)
Junos MPLS and VPNs (JMV) Course No: EDU-JUN-JMV Length: Five days Onsite Price: $32500 for up to 12 students Public Enrollment Price: $3500/student Course Level JMV is an advanced-level course. Prerequisites
100Gigabit and Beyond: Increasing Capacity in IP/MPLS Networks Today Rahul Vir Product Line Manager Foundry Networks rvir@foundrynet.
100Gigabit and Beyond: Increasing Capacity in IP/MPLS Networks Today Rahul Vir Product Line Manager Foundry Networks [email protected] 1 Agenda 2 40GE/100GE Timeline to Standardization The Ethernet Alliance
MAXIMIZE BANDWIDTH UTILIZATION WITH JUNIPER NETWORKS TE++
White Paper MAXIMIZE BANDWIDTH UTILIZATION WITH JUNIPER NETWORKS TE++ Lower Operations Overhead while Simplifying Network Planning Copyright 2014, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3
APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing
MPLS BASICS AND TESTING NEEDS By Thierno Diallo, Product Specialist Protocol Business Unit The continuing expansion and popularity of the Internet is forcing routers in the core network to support the
Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T
White Paper Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T Introduction to Virtual Private LAN Service The Cisco Catalyst 6500/6800 Series Supervisor Engine 2T supports virtual
Protection Methods in Traffic Engineering MPLS Networks
Peter Njogu Kimani Protection Methods in Traffic Engineering MPLS Networks Helsinki Metropolia University of Applied Sciences Bachelor of Engineering Information technology Thesis 16 th May 2013 Abstract
How To Make A Network Secure
1 2 3 4 -Lower yellow line is graduate student enrollment -Red line is undergradate enrollment -Green line is total enrollment -2008 numbers are projected to be near 20,000 (on-campus) not including distance
MPLS is the enabling technology for the New Broadband (IP) Public Network
From the MPLS Forum Multi-Protocol Switching (MPLS) An Overview Mario BALI Turin Polytechnic [email protected] www.polito.it/~baldi MPLS is the enabling technology for the New Broadband (IP) Public
MPLS L2VPN (VLL) Technology White Paper
MPLS L2VPN (VLL) Technology White Paper Issue 1.0 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
MPLS Environment. To allow more complex routing capabilities, MPLS permits attaching a
MPLS Environment Introduction to MPLS Multi-Protocol Label Switching (MPLS) is a highly efficient and flexible routing approach for forwarding packets over packet-switched networks, irrespective of the
MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service
Nowdays, most network engineers/specialists consider MPLS (MultiProtocol Label Switching) one of the most promising transport technologies. Then, what is MPLS? Multi Protocol Label Switching (MPLS) is
ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2
1 ISTANBUL 1.1 MPLS overview 1 1.1.1 Principle Use of a ATM core network 2 Overlay Network One Virtual Circuit per communication No routing protocol Scalability problem 2 1.1.1 Principle Weakness of overlay
VPLS Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-10-30
Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of
PRASAD ATHUKURI Sreekavitha engineering info technology,kammam
Multiprotocol Label Switching Layer 3 Virtual Private Networks with Open ShortestPath First protocol PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Abstract This paper aims at implementing
MPLS in Private Networks Is It a Good Idea?
MPLS in Private Networks Is It a Good Idea? Jim Metzler Vice President Ashton, Metzler & Associates March 2005 Introduction The wide area network (WAN) brings indisputable value to organizations of all
IMPLEMENTING CISCO MPLS V3.0 (MPLS)
IMPLEMENTING CISCO MPLS V3.0 (MPLS) COURSE OVERVIEW: Multiprotocol Label Switching integrates the performance and traffic-management capabilities of data link Layer 2 with the scalability and flexibility
DD2491 p2 2009. BGP-MPLS VPNs. Olof Hagsand KTH/CSC
DD2491 p2 2009 BGP-MPLS VPNs Olof Hagsand KTH/CSC Literature Practical BGP: Chapter 10 JunOS Cookbook: Chapter 14 and 15 MPLS Advantages Originally, the motivation was speed and cost. But routers does
DD2490 p4 2011. Routing and MPLS/IP. Olof Hagsand KTH CSC
DD2490 p4 2011 Routing and MPLS/IP Olof Hagsand KTH CSC 1 Literature Lecture slides and lecture notes (on web) Reference JunOS Cookbook: Chapter 14 2 Background MPLS - Multiprotocol Label Switching Originally
Introduction to MPLS-based VPNs
Introduction to MPLS-based VPNs Ferit Yegenoglu, Ph.D. ISOCORE [email protected] Outline Introduction BGP/MPLS VPNs Network Architecture Overview Main Features of BGP/MPLS VPNs Required Protocol Extensions
How Routers Forward Packets
Autumn 2010 [email protected] MULTIPROTOCOL LABEL SWITCHING (MPLS) AND MPLS VPNS How Routers Forward Packets Process switching Hardly ever used today Router lookinginside the packet, at the ipaddress,
Fast Re-Route in IP/MPLS networks using Ericsson s IP Operating System
Fast Re-Route in IP/MPLS networks using s IP Operating System Introduction: Today, Internet routers employ several routing protocols to exchange routes. As a router learns its potential routes, it builds
Traffic Engineering Management Concepts
3 CHAPTER This chapter includes an overview of Cisco Prime Fulfillment and of some of the concepts used in this guide. This chapter includes the following sections: Prime Fulfillment TEM Overview, page
MPLS Based Recovery Mechanisms
MPLS Based Recovery Mechanisms Master Thesis Johan Martin Olof Petersson UNIVERSITY OF OSLO May 2005 2 Foreword This thesis is part of my Candidatus Scientiarum studies in communication systems at the
MPLS Layer 3 and Layer 2 VPNs over an IP only Core. Rahul Aggarwal Juniper Networks. [email protected]
MPLS Layer 3 and Layer 2 VPNs over an IP only Core Rahul Aggarwal Juniper Networks [email protected] Agenda MPLS VPN services and transport technology Motivation for MPLS VPN services over an IP only core
Ativando MPLS Traffic Engineering
19 São Paulo 3-5 Julho, 2005 Ativando MPLS Traffic Engineering Alexandre Longo [email protected] Cisco Systems 19 1 Some Assumptions You understand basic IP routing You understand MPLS concepts and operation
Boosting Capacity Utilization in MPLS Networks using Load-Sharing MPLS JAPAN 2007. Sanjay Khanna Foundry Networks skhanna@foundrynet.
Boosting Capacity Utilization in MPLS Networks using Load-Sharing MPLS JAPAN 2007 Sanjay Khanna Foundry Networks [email protected] Agenda Why we need Load-Sharing Methods to boost capacity Trunks/Link
Addressing Inter Provider Connections With MPLS-ICI
Addressing Inter Provider Connections With MPLS-ICI Introduction Why migrate to packet switched MPLS? The migration away from traditional multiple packet overlay networks towards a converged packet-switched
MPLS - A Choice of Signaling Protocol
www.ijcsi.org 289 MPLS - A Choice of Signaling Protocol Muhammad Asif 1, Zahid Farid 2, Muhammad Lal 3, Junaid Qayyum 4 1 Department of Information Technology and Media (ITM), Mid Sweden University Sundsvall
Virtual Private LAN Service
Virtual Private LAN Service Authors Kireeti Kompella, Juniper Networks, 1194 N Mathilda Avenue, Sunnyvale, CA 94089, USA E-mail : [email protected] Jean-Marc Uzé, Juniper Networks, Espace 21, 31 Place
MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans
MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans Contents Overview 1 1. L2 VPN Padding Verification Test 1 1.1 Objective 1 1.2 Setup 1 1.3 Input Parameters 2 1.4 Methodology 2 1.5
SBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
Broadband Networks. Prof. Karandikar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture - 26
Broadband Networks Prof. Karandikar Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 26 Optical Network &MPLS So, as you were discussing in the previous lectures, next
For internal circulation of BSNLonly
E3-E4 E4 E&WS Overview of MPLS-VPN Overview Traditional Router-Based Networks Virtual Private Networks VPN Terminology MPLS VPN Architecture MPLS VPN Routing MPLS VPN Label Propagation Traditional Router-Based
Demonstrating the high performance and feature richness of the compact MX Series
WHITE PAPER Midrange MX Series 3D Universal Edge Routers Evaluation Report Demonstrating the high performance and feature richness of the compact MX Series Copyright 2011, Juniper Networks, Inc. 1 Table
RFC 2547bis: BGP/MPLS VPN Fundamentals
White Paper RFC 2547bis: BGP/MPLS VPN Fundamentals Chuck Semeria Marketing Engineer Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2001 or 888 JUNIPER www.juniper.net
MPLS Basics. For details about MPLS architecture, refer to RFC 3031 Multiprotocol Label Switching Architecture.
Multiprotocol Label Switching (), originating in IPv4, was initially proposed to improve forwarding speed. Its core technology can be extended to multiple network protocols, such as IPv6, Internet Packet
MPLS TE Technology Overview
C H A P T E R MPLS TE Technology Overview In this chapter, you review the following topics: MPLS TE Introduction Basic Operation of MPLS TE DiffServ-Aware Traffic Engineering Fast Reroute This chapter
White Paper. Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM. March 30, 2001
The leading edge in networking information White Paper Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM March 30, 2001 Abstract: The purpose of this white paper is to present discussion
MPLS. A Tutorial. Paresh Khatri. [email protected]
MPLS A Tutorial Paresh Khatri [email protected] Agenda 1. MPLS overview and LSP types 2. Distribution Protocol (LDP) 3. Questions Introduction Paresh Khatri ([email protected])
BFD. (Bidirectional Forwarding Detection) Does it work and is it worth it? Tom Scholl, AT&T Labs NANOG 45
BFD (Bidirectional Forwarding Detection) Does it work and is it worth it? Tom Scholl, AT&T Labs NANOG 45 What is BFD? BFD provides a method to validate the operation of the forwarding plane between two
MPLS Pseudowire Innovations: The Next Phase Technology for Today s Service Providers
MPLS Innovations: The Next Phase Technology for Today s Service Providers Introduction MPLS technology enables a smooth evolution of core networks within today s service provider infrastructures. In particular,
IPv6 over IPv4/MPLS Networks: The 6PE approach
IPv6 over IPv4/MPLS Networks: The 6PE approach Athanassios Liakopoulos Network Operation & Support Manager ([email protected]) Greek Research & Technology Network (GRNET) III Global IPv6 Summit Moscow, 25
MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb
MP PLS VPN MPLS VPN Prepared by Eng. Hussein M. Harb Agenda MP PLS VPN Why VPN VPN Definition VPN Categories VPN Implementations VPN Models MPLS VPN Types L3 MPLS VPN L2 MPLS VPN Why VPN? VPNs were developed
Comparative Analysis of Mpls and Non -Mpls Network
Comparative Analysis of Mpls and Non -Mpls Network Madhulika Bhandure 1, Gaurang Deshmukh 2, Prof. Varshapriya J N 3 1, 2, 3 (Department of Computer Science and IT, VJTI, Mumbai-19 ABSTRACT A new standard
WHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January 2008. Introduction...
Introduction WHITE PAPER Addressing Inter Provider Connections with MPLS-ICI The migration away from traditional multiple packet overlay networks towards a converged packet-switched MPLS system is now
Virtual Leased Lines - Martini
Virtual Lease Lines - Martini Virtual Leased Lines - Martini Martini Drafts draft -martini-l2circuit-encap-mpls -04.txt defines the handling and encapsulation of layer two packets. draft -martini-l2circuit-trans-mpls
- Multiprotocol Label Switching -
1 - Multiprotocol Label Switching - Multiprotocol Label Switching Multiprotocol Label Switching (MPLS) is a Layer-2 switching technology. MPLS-enabled routers apply numerical labels to packets, and can
MPLS-based Layer 3 VPNs
MPLS-based Layer 3 VPNs Overall objective The purpose of this lab is to study Layer 3 Virtual Private Networks (L3VPNs) created using MPLS and BGP. A VPN is an extension of a private network that uses
Testing Edge Services: VPLS over MPLS
Testing Edge Services: VPLS over MPLS White Paper Introduction Virtual Private LAN Services (VPLS) is an emerging technology for transparently connecting corporate LANs over the Internet so they appear
Migrating to MPLS Technology and Applications
Migrating to MPLS Technology and Applications Serge-Paul Carrasco June 2003 asiliconvalleyinsider.com Table Of Content Why to migrate to MPLS? Congestion on the Internet Traffic Engineering MPLS Fundamentals
TE in action. Some problems that TE tries to solve. Concept of Traffic Engineering (TE)
1/28 2/28 TE in action S-38.3192 Verkkopalvelujen tuotanto S-38.3192 Network Service Provisioning Networking laboratory 3/28 4/28 Concept of Traffic Engineering (TE) Traffic Engineering (TE) (Traffic Management)
Master Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for
L2 VPNs. Pseudowires. Virtual Private LAN Services. Metro/Carrier Ethernet.
L2 VPNs. Pseudowires. Virtual Private LAN Services. Metro/Carrier Ethernet. Petr Grygárek rek 1 Layer 2 VPNs 2 Usages of L2 VPNs Server farms/clusters and other L2- dependent applications redundancy and
MPLS Traffic Engineering - A Choice Of Signaling Protocols
MPLS Traffic Engineering - A Choice Of Signaling Protocols Analysis of the similarities and differences between the two primary MPLS label distribution protocols: RSVP and CR-LDP Paul Brittain, [email protected]
MPLS over IP-Tunnels. Mark Townsley Distinguished Engineer. 21 February 2005
MPLS over IP-Tunnels Mark Townsley Distinguished Engineer 21 February 2005 1 MPLS over IP The Basic Idea MPLS Tunnel Label Exp S TTL MPLS VPN Label Exp S TTL MPLS Payload (L3VPN, PWE3, etc) MPLS Tunnel
RSVP- A Fault Tolerant Mechanism in MPLS Networks
RSVP- A Fault Tolerant Mechanism in MPLS Networks S.Ravi Kumar, M.Tech(NN) Assistant Professor Gokul Institute of Technology And Sciences Piridi, Bobbili, Vizianagaram, Andhrapradesh. Abstract: The data
ETHERNET VPN (EVPN) NEXT-GENERATION VPN FOR ETHERNET SERVICES
ETHERNET VPN (EVPN) NEXT-GENERATION VPN FOR ETHERNET SERVICES Alastair JOHNSON (AJ) February 2014 [email protected] AGENDA 1. EVPN Background and Motivation 2. EVPN Operations 3. EVPN
Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks
Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Faiz Ahmed Electronic Engineering Institute of Communication Technologies, PTCL
Real-Time Traffic Engineering Management With Route Analytics
Real-Time Traffic Engineering Management With Route Analytics Executive Summary Increasing numbers of service providers and mobile operators are using RSVP-TE based traffic engineering to provide bandwidth
MPLS Traffic Engineering in ISP Network
MPLS Traffic Engineering in ISP Network Mohsin Khan Birmingham City University, England ABSTRACT Multi Protocol Label Switching (MPLS) is an innovative and vibrant technology. The most famous applications
Department of Communications and Networking. S-38.2131/3133 Networking Technology, Laboratory course A/B
Department of Communications and Networking S-38.2131/3133 Networking Technology, Laboratory course A/B Work Number 38: MPLS-VPN Basics Student Edition Preliminary Exercises and Laboratory Assignments
IMPLEMENTING CISCO MPLS V2.3 (MPLS)
IMPLEMENTING CISCO MPLS V2.3 (MPLS) COURSE OVERVIEW: The course will enable learners to gather information from the technology basics to advanced VPN configuration. The focus of the course is on VPN technology
Building A Cheaper Peering Router. (Actually it s more about buying a cheaper router and applying some routing tricks)
Building A Cheaper Peering Router (Actually it s more about buying a cheaper router and applying some routing tricks) Tom Scholl nlayer Communications, Inc. 1 What s this all about?
NAVAL POSTGRADUATE SCHOOL THESIS
NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS A PERFORMANCE ANALYSIS OF BGP/MPLS VPN FAILOVER FUNCTIONALITY by Guan Chye Tan December 2006 Thesis Advisor: Second Reader: Geoffrey Xie John Gibson
Virtual Private LAN Service (VPLS)
White Paper Virtual Private LAN Service (VPLS) Scalable Ethernet-Based Enterprise Connectivity and Broadband Delivery Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408.745.2000
SDN IN WAN NETWORK PROGRAMMABILITY THROUGH CENTRALIZED PATH COMPUTATION. 1 st September 2014
SDN IN WAN NETWORK PROGRAMMABILITY THROUGH CENTRALIZED PATH COMPUTATION st September 04 Aaron Tong Senior Manager High IQ Networking Centre of Excellence JUNIPER S AUTOMATION HORIZON SDN IS A JOURNEY NOT
Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang [email protected] AT&T
Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang [email protected] AT&T 1 Outline! BGP/MPLS VPN (RFC 2547bis)! Setting up LSP for VPN - Design Alternative Studies! Interworking of LDP / RSVP
WHITE PAPER. Multi-Protocol Label Switching (MPLS) Conformance and Performance Testing
WHITE PAPER Multi-Protocol Label Switching (MPLS) Conformance and Performance Testing www.ixiacom.com 915-1838-01 Rev. C, January 2014 2 Table of Contents Abstract... 4 Introduction... 4 What is MPLS?...
Enterprise Network Simulation Using MPLS- BGP
Enterprise Network Simulation Using MPLS- BGP Tina Satra 1 and Smita Jangale 2 1 Department of Computer Engineering, SAKEC, Chembur, Mumbai-88, India [email protected] 2 Department of Information Technolgy,
VPN Technologies A Comparison
VPN Technologies A Comparison Matthew Finlayson, [email protected] Jon Harrison, [email protected] Richard Sugarman, [email protected] First issued February 2003 100
Evaluating performance on an ISP MPLS network
Evaluating performance on an ISP MPLS network Dilmohan Narula, Mauricio Rojasmartinez, Venkatachalapati Rayipati [email protected], [email protected], [email protected]
MPLS and IPSec A Misunderstood Relationship
# 129 TECHNOLOGY WHITE PAPER Page: 1 of 5 MPLS and IPSec A Misunderstood Relationship Jon Ranger, Riverstone Networks ABSTRACT A large quantity of misinformation and misunderstanding exists about the place
Bandwidth Management in MPLS Networks
School of Electronic Engineering - DCU Broadband Switching and Systems Laboratory 1/17 Bandwidth Management in MPLS Networks Sanda Dragos & Radu Dragos Supervised by Dr. Martin Collier email: [email protected]
Network Virtualization with the Cisco Catalyst 6500/6800 Supervisor Engine 2T
White Paper Network Virtualization with the Cisco Catalyst 6500/6800 Supervisor Engine 2T Introduction Network virtualization is a cost-efficient way to provide traffic separation. A virtualized network
AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0
AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0 Introduction...2 Overview...2 1. Technology Background...2 2. MPLS PNT Offer Models...3
The Essential Guide to Deploying MPLS for Enterprise Networks
White Paper The Essential Guide to Deploying MPLS for Enterprise Networks Daniel Backman Systems Engineer Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale,
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification
Implementing Cisco MPLS
Implementing Cisco MPLS Course MPLS v2.3; 5 Days, Instructor-led Course Description This design document is for the refresh of the Implementing Cisco MPLS (MPLS) v2.3 instructor-led training (ILT) course,
Kingston University London
Kingston University London Thesis Title Implementation and performance evaluation of WAN services over MPLS Layer-3 VPN Dissertation submitted for the Degree of Master of Science in Networking and Data
Course Description. Students Will Learn
Course Description The next generation of telecommunications networks will deliver broadband data and multimedia services to users. The Ethernet interface is becoming the interface of preference for user
Enhancing Converged MPLS Data Networks with ATM, Frame Relay and Ethernet Interworking
TECHNOLOGY WHITE PAPER Enhancing Converged Data Networks with, Frame Relay and Ethernet Interworking Virtual Private Networks (VPN) are a popular way for enterprises to interconnect remote sites. Traditionally,
MPLS-TP. Future Ready. Today. Introduction. Connection Oriented Transport
MPLS-TP Future Ready. Today Introduction As data traffic started dominating telecom networks, there was a need for transport data networks, as opposed to transport TDM networks. Traditional transport technologies
