1 Introduction
With the rapid development of Internet and optical fiber technology, the integration of IP and Optical network technology will become an important trend of network development in the future. How to solve the integration of IP layer and optical layer, GMPLS provides a good idea. Gmpls inherits almost all MPLS features and protocols, and is an extension of MPLS to optical network, it can use u
Multi-Protocol label switching (MPLS)
In traditional 3-tier forwarding, each router extracts forwarding information from a 3-tier file header as packets are transmitted over the network. This file header analysis is repeated for each router that the packet passes through.
In MPLS networks, packets are forwarded according to the label. Each IP network that can be reached through an interface is assigned a
switches.
Since the middle of 1990s, the world's major companies have studied the third-tier exchange and proposed many different solutions and launched many products. Such as Cisco label exchange TAG Swiching, Ipsilon IP address exchange, and Toshiba Cell Exchange Router CSR: Cell Switching Router) and IBM's ARISAggregate Route based IP Switching), and IETF's Multi-Protocol Label Switching MPLS: Multi-Protocol Label Switching.
TAG Switching is a vro
forwarding for different queues based on predefined or user-specified priorities.Routers usually use RED Early Detection and WRED weighted early detection in the queue to avoid congestion.MPLS Technology As an efficient IP backbone network technology platform, MPLS technology provides a flexible and scalable backbone network exchange technology for the next generation of IP networks. Using MPLS technology
VPN technology-P, PE, CE what is P, PE, cempls vpn there are three types of routers, CE router, PE router and P router. The CE router is a client router that provides you with a connection to the PE router. The PE router is the operator's edge router, that is, the Label Edge Router (LER) in the MPLS network ), it processes the VPN data from the CE router or the label exchange path (LSP) based on the stored route information and forwards the data. It i
In the previous compilation of MPLS into the Linux kernel, it is now necessary to install Iprouter, the installation process is as follows:1) Download two files of iproute2-2.6.39.tar.gz and Iproute2-v2.6.39-mpls.patch.Iproute2-2.6.39.tar.gz:http://pkgs.fedoraproject.org/repo/pkgs/iproute/iproute2-2.6.39.tar.gz/8a3b6bc77c2ecf752284aa4a6fc630a6/ Iproute2-2.6.39.tar.gzIproute2-v2.6.39-mpls.patch:Http://ftp.jaist.ac.jp/pub/sourceforge/m/project/mp/
PDevice,PEDevice,CEDevice
Mpls vpn has three types of routers: CE router, PE router, and P router.
(1) The CE router is a client router that provides you with a connection to the PE router. The PE router is the operator's edge router, that is, the Label Edge Router (LER) in the MPLS network ), it processes the VPN data from the CE router or the label exchange path (LSP) based on the stored route information
Recently, when using Cold Standby tar for Oracle database migration, You need to filter out the files exported by datapump under the current database file, otherwise, a large tar file will be generated and the network transmission time will be consumed. In fact, the tar command provides a filtering function, but many people do not know it because the filtering function is usually used less. This article describes how to filter unwanted files or folders under the tar command.
1. Demo Environment
# The BBB, CCC, and BNR subdirectories exist in the current tree directory. Now, you need to filter out the dump file of gz, that is, you do not need to package [oracle @ linux1 ~]. $ Tree AAAAAA | -- BBB | '-- SYTST_temp.dbf | -- BNR | -- dump | -- emp.dmp.gz | -- tb.dmp.gz |' -- xx.dmp.gz | '-- full | -- CCC | '-- tempSYTST. dbf | -- SYTST. sh' -- initSYTST. ora5 directories, 7 files
# Method 1: Filter Using the exclude parameter and use the wildcard [oracle @ linux1 ~] $ Tar-czvf A1.tar.gz -
encapsulated at Layer 3rd of the network protocol stack. The following tunnel protocols are available:IPSecIP Security) Protocol: the IPSec protocol is not a separate protocol. It provides a complete set of architecture for data Security on the IP network, including AHAuthentication Header), ESPEncapsulating Security Payload) IKEInternet Key Exchange. To ensure the integrity, authenticity, anti-replay and private nature of data packets during network upload and transmission.GREGeneric Routing E
another, while the route table describes the network information and directs the data packet from one machine to another. 4. misunderstandings
At present, many people understand the implementation of a system. These people are similar to three categories. The first type is proficient in Linux kernel, the second type is proficient in the configuration of Cisco devices, and the third type is proficient in Windows Network Programming and NDIS. The three types have very few common intersections, so
As a new network architecture, SDN has become a hot topic in the industry. The open network it advocates represents a change in the concept of network construction from adapting network capabilities to actively adapting network capabilities to the needs of network applications. Separation of forwarding and control, centralized control, and open network programming interfaces are the main features of SDN network architecture.
As the main SDN protocol, openflow hopes to use a new forwarding protoc
different methods, namely, IP packets, ATM cells, SDH frames, and WDM wavelengths. In actual use, there is no need for so many bandwidth particles. In terms of functions, each layer has functions of adjacent layers, especially the protection and recovery functions. Each layer has functions that make it very complex and even conflict with each other. In short, the existing layer-4 network structure cannot meet the needs of data business development, and new technical means must be developed.Figu
practical application of the research direction, more and more organizations and groups are paying attention to this issue.
The evolution from IPv4 to IPv6 is a long-term complex process, so it is impossible to achieve it overnight in the short term, at present, there are two main types of solutions: Pure IP network evolution solution and MPLS network evolution solution. Pure IP network solution refers to the basic process of using IP networks as the
.
The evolution from IPv4 to IPv6 is a long-term complex process, so it is impossible to achieve it overnight in the short term, at present, there are two main types of solutions: Pure IP network evolution solution and MPLS network evolution solution. Pure IP network solution refers to the basic process of using IP networks as the bearer upper-layer services at the backbone, Metro, and access layers. means; MPLS
Gateway) mechanism to support some special application protocols, without any modification to the NAT platform, it has good scalability. The packets of these special protocols carry the address or port information, which may also need to be converted.
Supported special protocols include: FTP (file transfer protocol, file transfer protocol), PPTP (Point-to-Point Tunneling Protocol, point-to-point tunnel protocol), ICMP (Internet Control Message Protocol, internet Control Message Protocol), DNS (
The current network construction has been developed from the original regional network to cross-regional, trans-city wide area Connection, and the security requirements of the network and the increasing carrying business, with the original means of networking many problems difficult to solve. Because of the inherent advantages of MPLS VPN technology, the special network has solved the problems that bother users and integrators. The following is the us
clear boundary, Do not want to provide their own internal network information to other people to share. This kind of function is distinct and has the characteristic of stratification, it is the main characteristic of overlapping model.
The Peer-to-peer model unifies the control plane of the optical transmission network level and the Service Exchange network level, uses the unified control plane, from the control point of view, they are equal, does not divide the upper and lower level, its addr
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.