At present, the MPLS fast rerunning technology is widely used. We believe that with the development of the communication industry, the MPLS fast rerunning technology will be more comprehensive and stable, bringing users a good network environment. To meet real-time applications such as video conferencing and television services, LSP protection capabilities similar to traditional SDHAPS must be provided for
1. With the advances in hardware technology and the creation of high-speed routers and three-layer switches, MPLS has had little meaning to increase the speed of forwarding. However, MPLS has been widely used in virtual private network, traffic engineering, QoS and so on because of its support of tag stack and connection-oriented characteristics. MPLS Label switc
The previous document has already learned the information dissemination through OSPF, also introduced the CSPF and path's establishment RSVP work principle.
What should we do next?
You can forward customer data traffic along the tunnel interface in three ways:
Static routing routes
Policy Routing Policy Routing
Automatic routing Autoroute
So to be more blunt, this piece of content is the final phase of Te Tunnel, the key to the key. Just imagine, through arduous, established a te tunnel, b
In March 1999, the Internet Task Force (IETF) published a RFC2547 by Cisco, describing a way for operators to provide virtual private network (VPN) services to users through an IP backbone network. This method uses an extended BGP (Boundary routing protocol) to distribute VPN routing information through the carrier backbone network, and uses Multiprotocol token switching (MPLS) to forward VPN traffic between the VPN user sites. The main purpose of thi
Absrtact: Broadband IP metropolitan Area network, routing planning and design is the core link. In the beginning of the network, must be integrated planning. According to the construction of the metropolitan area Network, the routing strategy based on Bgp/mpls VPN is adopted, which is proved to be feasible by practice.
Key words: BGP MPLS VPN IP Routing strategy
1 Broadband metropolitan Area Network overv
Before learning MPLS, you should know that MPLS has two modes of operation.
1, Frame mode--gt; in the third-level group header (such as IP packet header) before the tag to forward.
2.---gt; in the MPLS network composed of ATM LSR, MPLS is used to exchange Vpi/vci information in the control plane instead of using ATM
In the HUB-AND-SPOKE environment of mpls vpn, for the sake of security AND cost, the branches are not interconnected, AND the access between the branches must go through the firewall of the headquarters, both the security effect and the cost are saved.The experiment topology is as follows:Due to the existence of the downstream bits and domain tags in the anti-ring mechanism of OSPF, the route may not be received in the outbound VRF of r6. therefore, t
MPLS (Multi-propocol Label Switching) is a Multi-Protocol Label exchange.MPLS is a third-generation network architecture and a new generation of IP High-Speed Backbone Network Exchange Standard, proposed by IETF (Internet Engineering Task Force, Internet Engineering Task Group, led by Cisco, ascend, 3Com, and other network equipment manufacturers.MPLS is an integrated IP over ATM technology. It combines routing functions on Frame Relay and ATM switch,
In the traffic engineering of MPLS TE, it is divided into the following aspects:
1, the release of information
2, the calculation and establishment of the path
3, traffic forwarding in the tunnel.
So here to understand the path calculation and build, first of all to understand how SPF is working, and then see what is CSPF (constrained SPF). In order to establish the calculation of the path is a good understanding. In detail, why do you want to lea
The principle of the protection of TE is already mentioned. Today's focus is to explain how the Frr-fast-reroute in Te Protection is configured, and how to look at the state.
Before introducing the configuration, it is important to note that FRR fast rerouting is a protection mechanism.
Imagine if the R2 to R6 is an ordinary IGP network. After the middle link down, what is the situation?
It should be the first problem the router sends the LSA through the other interface and then reddening to
Cea1:r01 (R01---E0/2---R06)
CEB1:R07 (R07---e0/0---R06) temporarily end with this CE end
ISP:R06---E1/1---R02---e1/0---R08
CEA2:R03 (R03---E0/2---R08)
CEB2:S09 (R08---e0/0---S09) temporarily end with this CE end
1, the core of the SP to run a IGP first, so that the core of the routers within the route to reach
2, the SP's PE end runs between the MP-BGP (VPNV4,MP-BGP neighbor must use the ring back to establish)
3, the SP PE end to create VRF, and CE-connected interface into the VRF
4, in
What is the premise of using MPLS traffic engineering for CISCO? or MPLS te configuration logic:
Cisco IOS software version that supports MPLS traffic engineering.
The network needs to start CEF.
The link state protocol used as IGP OSPF or Is-is. Only these two protocols can support TE. (OSPF provides a class tenth LSA to propagate related TE information).
Th
Because the study of the major is computer network technology, but in school, and did not learn how much network knowledge, so in order to be worthy of the professional, in 06, when working in the Galaxy education in hit a CCNA class, two weeks of the course, a few hours a day.The result is still not learned, because there is too much theory, too little real exercise.So I bought a book, repeatedly see, the theoretical things finally understand, the fo
, which is intercepted by the owner proxy and encapsulated through a IPv6-in-IPv6) tunnel to the current transfer address of the mobile node. When a mobile node receives a packet encapsulated by a IPv6-in-IPv6, it sends a binding update message. If the entry LER receives the Binding Update message from the mobile node, it initiates the LSP operation between the entry LER and the exit LER.
The IP-in-IP tunneling technology of the original Mobile IP protocol has a high header overhead and heavy lo
MPLS, IPSEC, and SSL analysis MPLS leased line MPLS (Multi-Protocol Label Switching), Multi-Protocol Label Switching. * Multi-Protocol refers to MPLS's support for multiple network layer protocols, such as IP, IPv6, and IPX. It is also compatible with multiple link layer technologies, including ATM, frame relay, Ethernet, and PPP; * label exchange is to attach a
Key knowledge points in this document:
Principle of CSPF Route selection
Parameters that have an effect on the CSPF path selection
How does the MPLS te display path be established?
cspf--constrained SPF (shorest path tree). Is the core of Mpls te path selection, as we already know, the functions of Mpls te are:
1, Information Release 2, path calculation and
This article is about troubleshooting MPLS ldp.
Two devices establish direct-attached LDP neighbors:
R2 and R3.r2 's interface Giga 2/0 and R3 interface to establish the LDP's direct-link neighbors.
First, review the LDP's neighbor establishment process:
LDP utility is the UDP/TCP Port 646来 discovers the neighbor's. So in the future troubleshooting, if the two sides can ping, but can not build a neighbor to check whether the port has been sealed
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.