Background: two lines used by our company, one of which is the MPLS line of China Telecom. We need to transmit the routes to the BGP Route of China Telecom, the BGP routing protocol of China Telecom is transmitted to the corresponding routing table of the headquarters.Symptom:Suddenly, the MPLS line of China Telecom wa
As the customer's network scale and coverage grow, the use of BGP routing protocols is no longer the privilege of the operator's network, and more enterprise networks are also deploying BGP. BGP can support a larger network, a wide range of routing policies, and a large number of route table capacity. However, the BGP
BGP Extended Communities for OSPF PE-CE Routing-domain ID analysis to make OSPF Routing characteristics can pass through the mpls vpn backbone network, it needs to define some BGP Extended group attributes. OSPF attributes that can be passed through mp bgp include:The extended attribute of mp
The basic Border Gateway Protocol (BGP) routing selection protocol is divided into two types: l Internal Gateway Protocol (IGP) l external Gateway Protocol (EGP) BGP is an Inter-Domain Routing Protocol, also known as EGP autonomous system, the same internal gateway protocol and unified measurement value are used to forward data packets within the AS, and an external gateway protocol is used to forward data
BGP routing protocolPublic AS: 0-64511 PRIVATE: 64512-65535 China Telecom: 4134 China Netcom: 9929BGP use 1. Cross different, management issues 2. OSPF Support 1 W + routes ISIS support 2 W + routes 3. High Policy controllability 4. Strong scalability free public network route table route-server.ip.att.netreviews do not use BGP: 1. You have not completed the NP course, not familiar with
1. Introduction
BGP is a routing protocol between autonomous systems. The Network accessibility information exchanged by BGP provides sufficient information to detect routing loops and make decisions based on performance precedence and policy constraints. In particular, BGP exchanges the network accessibility information of all as paths and executes routing po
Mpls–te:
1, about TE Flow engineering background Knowledge Introduction:
Why is there a te flow of engineering production?In the real production network, IGP often some fatal restrictions, such as OSPF is based on cost to select the path, the cost of the smaller the more priority. But sometimes the smaller the cost, does not mean that the link load is small. For example, there is a link is 100M, with 99M, there is another link is E1, with less than
Mpls ldp protocol-Operation Process
1. For each igp ip prefix in the IP route tableLDPOfLSRA label and a mapping will be generated, and then LSR will upload this mapping to allLDP neighborThe LSR running LDP establishes a neighbor relationship ).
2. each LSR will save a LIB table label information base) label information library). This table collects all prefix and label mapping received from all LDP neighbors. Therefore, for an IP prefix, there will
Today, many mobile operators are faced with the challenge of upgrading their infrastructure to support the future development of mobile data businesses. At the same time, they are working hard to reduce costs based on their own business objectives. To achieve this, far-sighted operators are trying to find out which aspects of their network design are lacking and find out why they cannot promote their current and future business development.For many GPRS operators, one of the shortcomings is that
Nowadays, with the popularization and development of the Internet, mpls vpn technology is becoming more and more popular. mpls vpn is a type of MPLS Multiprotocol Label Switching Based Multi-Protocol Label Switching) the technical ip vpn is to use MPLS technology on network routes and exchange devices to simplify the r
Ethernet tunnel technologies such as provider backbone transport (PBT) and Transport MPLS (T-MPLS) are generating a great deal of interest. tunnel technologies aim to enable "connection-oriented" Ethernet transport with high levels of reliability, manageability and scalability.
Note that PBT has been given a new name by the ieee in the project authorization, and we'll use the new name: provider backbone bri
To allow OSPF routing features to pass through the mpls vpn backbone network, some BGP extended group attributes need to be defined. OSPF attributes that can be passed through mp bgp include:
650) this. width = 650; "border =" 0 "alt =" "src =" http://www.bkjia.com/uploads/allimg/131227/0201221933-0.jpg "/>
The extended attribute of mp
open communication network. It introduces the connection mode in a connectionless network, this reduces network complexity and is compatible with various mainstream network technologies, greatly reducing network costs while improving IP service performance, it ensures the service quality of network communication and the security of data transmission. The combination of multicast technology and mpls vpn technology will provide operators with an unprec
To solve the problems faced by the Internet-based IP backbone network, the IETF proposed Multi-Protocol Label Switching (MPLS ). MPLS can greatly improve IP Forwarding performance on the backbone network, and provide service classification (CoS) and QoS Assurance. MPLS can be used on a considerable number of existing trunk ATM networks to implement high-performan
Mpls ldp protocol-destination-based LDP session
Generally,LDP neighborAll are built on the direct connection LSR, but the cross-LSR neighbors need to be established in the AToM and TE tunneling networks. These neighbors are not directly connected.
Mpls ldp protocol-LDP Authentication
LDP is based on TCP, so all TCP attacks will affect LDP, such as semi-open connections.
LDP peers can use MD5 authentication
10. Conclusion
The BGP protocol provides high control and flexibility for Inter-Domain Routing, implements policy constraints, and avoids routing loops. The guidelines described here provide a starting point for BGP use. As BGP grows, it will provide more advanced and manageable routing methods.
Appendix A. Relationship between
BGP is a path vector routing protocol. Its job is to exchange route information between autonomous systems to find the most effective path for accessing data somewhere on the Internet. How do I select the optimal route? Cisco borderless networks reveal 14 BGP routing principles:
BGP routing principle: premise (the next hop of a route can be reached, synchronizati
Internet must have two basic attributes: QoS Assurance and optimal resource use. Optimal use of resources is a necessary step to avoid traffic congestion and service degradation. This work is done by the traffic engineering. Multi-Protocol Label Switching, MPLS) is widely regarded as an important traffic control tool for IP networks. This importance comes down to two main features: first, the use of short and fixed-length labels during packet transmi
Before the document starts, I think it is necessary to know the signaling protocol for MPLS Te.
Rsvp-te
The agreement itself is relatively mature and has been applied in scale.
--based on the soft state, the scalability is relatively poor.
Cd-ldp
Protocol relatively new, immature, basically no application.
--based on hard state, extensibility is better.
Ultimately, however, the market decides that RSVP is accounted for first, so when it comes t
BGPBorderGatewayProtocol) is the Border Gateway Protocol used to connect to independent systems on the Internet. It is an enhanced, comprehensive, and scalable protocol developed by the Internet Engineering Task Group. BGP4 supports the CIDR addressing scheme, which increases the number of available IP addresses on the Internet. BGP was designed to replace the original external gateway protocol EGP and is also considered a path vector protocol.
Backgr
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.