This document provides an overview of MPLS (Multi-Protocol Label Switching) concepts including label switching, label allocation, and label forwarding. It discusses MPLS label structure, label encapsulation, label spaces, label forwarding entries, and label distribution protocols. The key topics covered are:
1) MPLS was developed to integrate connectionless IP networks with connection-oriented ATM networks for traffic engineering and QoS purposes. It works by encapsulating packets with labels and performing label switching instead of IP forwarding.
2) MPLS uses labels added to packet headers to forward packets. Label allocation can be downstream-on-demand or unsolicited. Label distribution protocols like LDP are used to establish label
This document provides an overview of Multi-Protocol Label Switching (MPLS) technology. It discusses MPLS fundamentals, components, operations, applications for traffic engineering, virtual private networks, and any transport over MPLS. It also outlines topics like MPLS label distribution, virtual private network models, and future developments in MPLS. The document is intended to guide readers on key concepts in MPLS and provide background for further study.
MPLS provides benefits such as supporting multiple applications, decreasing forwarding overhead on core routers, and supporting forwarding of non-IP protocols. MPLS establishes label switched paths using label distribution protocols like LDP to propagate labels between routers so that packets can be forwarded based on a label lookup rather than a routing table lookup at every hop. During convergence after a link failure, routing protocols first reconverge while MPLS convergence involves repopulating forwarding information based on stored label mappings.
The document discusses the configuration of static MPLS label switched paths (LSPs) across a network topology consisting of routers in various cities. It describes how each router is configured to either push a label, swap a label, or pop the top label as packets traverse the LSP from Jakarta to Makasar and back. Traceroute outputs are provided to show the functioning LSP paths versus normal IGP routing. Complete configuration snippets are included in an appendix.
MPLS L3 VPN allows companies to offer Layer 3 VPN services with advantages like scalability, security, and support for duplicate IP addresses and different network topologies. The key components that enable this are VRF tables on PE routers that separate routing information for each customer to avoid duplicate IP issues, and MP-BGP which customizes VPN routing information using a Route Distinguisher, VPN label, and Route Target to support different VPN topologies. MPLS L3 VPN provides services like multi-homed sites for redundancy, hub-and-spoke networks, internet access with security, and extranets for inter-company communication.
The document provides information about an upcoming training course on deploying MPLS L3 VPNs. It includes details about the trainers, Nurul Islam Roman and Jessica Wei, their backgrounds and areas of expertise. It also outlines the course agenda which will cover topics such as MPLS VPN models, terminology, operation, configuration examples and service deployment scenarios.
MPLS VPN provides a way to extend private network connectivity over a shared public infrastructure in a secure manner. It utilizes MPLS to create virtual point-to-point connections between customer sites. There are two main types of MPLS VPNs - Layer 3 VPNs which use extensions to BGP to exchange routing information between customer edge routers and provider edge routers, and Layer 2 VPNs which extend customer layer 2 networks across the MPLS backbone by encapsulating layer 2 frames with labels.
This document provides an overview of Multi-Protocol Label Switching (MPLS) technology. It discusses MPLS fundamentals, components, operations, applications for traffic engineering, virtual private networks, and any transport over MPLS. It also outlines topics like MPLS label distribution, virtual private network models, and future developments in MPLS. The document is intended to guide readers on key concepts in MPLS and provide background for further study.
MPLS provides benefits such as supporting multiple applications, decreasing forwarding overhead on core routers, and supporting forwarding of non-IP protocols. MPLS establishes label switched paths using label distribution protocols like LDP to propagate labels between routers so that packets can be forwarded based on a label lookup rather than a routing table lookup at every hop. During convergence after a link failure, routing protocols first reconverge while MPLS convergence involves repopulating forwarding information based on stored label mappings.
The document discusses the configuration of static MPLS label switched paths (LSPs) across a network topology consisting of routers in various cities. It describes how each router is configured to either push a label, swap a label, or pop the top label as packets traverse the LSP from Jakarta to Makasar and back. Traceroute outputs are provided to show the functioning LSP paths versus normal IGP routing. Complete configuration snippets are included in an appendix.
MPLS L3 VPN allows companies to offer Layer 3 VPN services with advantages like scalability, security, and support for duplicate IP addresses and different network topologies. The key components that enable this are VRF tables on PE routers that separate routing information for each customer to avoid duplicate IP issues, and MP-BGP which customizes VPN routing information using a Route Distinguisher, VPN label, and Route Target to support different VPN topologies. MPLS L3 VPN provides services like multi-homed sites for redundancy, hub-and-spoke networks, internet access with security, and extranets for inter-company communication.
The document provides information about an upcoming training course on deploying MPLS L3 VPNs. It includes details about the trainers, Nurul Islam Roman and Jessica Wei, their backgrounds and areas of expertise. It also outlines the course agenda which will cover topics such as MPLS VPN models, terminology, operation, configuration examples and service deployment scenarios.
MPLS VPN provides a way to extend private network connectivity over a shared public infrastructure in a secure manner. It utilizes MPLS to create virtual point-to-point connections between customer sites. There are two main types of MPLS VPNs - Layer 3 VPNs which use extensions to BGP to exchange routing information between customer edge routers and provider edge routers, and Layer 2 VPNs which extend customer layer 2 networks across the MPLS backbone by encapsulating layer 2 frames with labels.
This document describes a presentation on designing MPLS Layer 3 VPN networks, covering MPLS VPN technology overview, configuration, services such as multihoming and hub-and-spoke, and best practices. The presentation discusses how MPLS VPNs use VRFs, MP-BGP, and label switching to provide scalable VPN services to enterprises by separating routing and forwarding tables for each customer VPN. Sample MPLS VPN configurations for PE, P, and route reflector routers are also provided.
The document provides an introduction to MPLS (Multi-Protocol Label Switching) covering its definition, advantages, architecture, labels, label switching path setup, and forwarding operations. Key points include:
- MPLS encapsulates packets with short fixed-length labels to enable faster forwarding based on the label rather than the IP address.
- MPLS decouples routing from forwarding and supports traffic engineering and virtual private networks.
- The MPLS architecture consists of label edge routers, label switch routers, label distribution protocols, and label forwarding tables.
- Labels are assigned and distributed to establish label switched paths for forwarding packets across the MPLS network.
An introduction to MPLS networks and applicationsShawn Zandi
Multiprotocol Label Switching (MPLS) provides label switched path to deliver packets in networks. This is an introduction course to understand different terminologies and concepts associated with MPLS.
Segment routing allows a node to steer a packet through an ordered list of segments encoded in the packet header. Segments represent instructions like forwarding through specific nodes or along certain paths. By encoding the path in packets, segment routing can compute paths centrally and reduce network state.
LDP allows MPLS routers to exchange label mapping information by establishing LDP sessions between peers. LDP defines procedures and messages for routers to advertise label bindings and establish label switched paths for forwarding traffic. LDP sessions can be directly connected over a single hop or nondirectly connected over multiple hops using targeted Hellos.
The document is a tutorial on L2VPN (Layer 2 Virtual Private Networks) that provides an agenda covering introductions, concepts, transports, services, pseudowire stitching, QoS, and demonstrations. It defines L2VPN as providing an end-to-end layer 2 connection across a service provider's MPLS or IP core, allowing legacy services like Frame Relay and ATM to be migrated to an MPLS/IP infrastructure. It also describes the need for L2VPN, models like VPLS and VPWS, basic building blocks of pseudowires, and control plane requirements.
Tutorial about MPLS Implementation with Cisco Router, this first of two chapter discuss about What is MPLS, Network Design, P, PE, and CE Router Description, Case Study of IP MPLS Implementation, IP and OSPF Routing Configuration
This slide contains basic concept about MPLS and LDP protocol, according to the latest version of Cisco books(SP and R&S) and i taught it at IRAN TIC company.
i will prepare MPLS_VPN and MPLS_QoS and MPLS_TE later.
MPLS enables packets to be forwarded based on labels rather than IP addresses. PE routers add labels to incoming packets and remove labels from outgoing packets. P routers swap or pop labels to forward packets. MPLS with L3 VPN allows private networks in different locations to communicate securely over a shared infrastructure by associating routes with virtual routing instances (VRFs) and advertising them using BGP. An example configuration shows VRF and BGP configuration, along with commands to view MPLS label bindings and packet forwarding information.
MPLS provides mechanisms for traffic engineering by allowing routers to forward packets based on fixed-length labels rather than long variable length IP addresses. MPLS labels are assigned to packets at ingress routers and swapped or removed by transit and egress routers along the Label Switched Path (LSP). Routers can be configured with constraints and administrative groups to calculate optimal LSP paths using protocols like RSVP and LDP.
This document provides an overview and student guide for the "Implementing Cisco MPLS (MPLS) Version 2.2" course. It introduces basic MPLS concepts including the MPLS architecture, labels, label stacks, and applications such as MPLS VPNs and traffic engineering. It also covers frame-mode MPLS implementation on Cisco IOS platforms, including configuration, monitoring, and troubleshooting tasks. Finally, it discusses MPLS VPN technology in depth, including the MPLS VPN architecture, routing model, and packet forwarding mechanisms.
This document provides an overview of Multiprotocol Label Switching (MPLS), including its history, key concepts, applications, and use by service providers. MPLS was developed in the late 1990s to meet the needs of scalable routing and quality of service on the growing internet. It works by assigning fixed length labels to data packets, allowing routers to forward based on these labels rather than long network addresses. Major applications of MPLS include traffic engineering, virtual private networks, and bandwidth management. The document discusses how service providers like MegaPath use MPLS in their backbones to provide integrated data and voice services, and nationwide networking solutions for corporate customers.
Overview of the MPLS backbone transmission technology.
MPLS (MultiProtocol Layer Switching) is a layer 2.5 technology that combines the virtues of IP routing and fast layer 2 packet switching.
IP packet forwarding is not suited for high-speed forwarding due to the need to evaluate multiple routes for each IP packet in order to find the optimal route, i.e. the route with the longest prefix match.
However, Internet Protocol routing provides global reachability through the IP address and through IP routing protocols like BGP or OSPF.
Layer 2 packet switching has complementary characteristics in that it does not provide global reachability through globally unique addresses but allows fast packet forwarding in hardware through the use of small and direct layer 2 lookup addresses.
MPLS combines IP routing and layer 2 switching by establishing layer 2 forwarding paths based on routes received through IP routing protocols like BGP or OSPF.
Thus the control plane of an MPLS capable device establishes layer 2 forwarding paths while the data plane then performs packet forwarding, often in hardware.
MPLS is not a layer 2 technology itself, i.e. it does not define a layer 2 protocol but rather makes use of existing layer 2 technologies like Ethernet, ATM or Frame Relay.
Slides for lecturing in Alpha Networks Inc.
Introduce the routing mechanism in Trellis, namely Segment Routing, from the upper side of application design
and ONOS core functions, to the lower side of fabric pipelines and flows on OFDPA.
The 5-day course covers preparation for the MEF-CECP exam, focusing on carrier Ethernet concepts. Day 1 introduces carrier Ethernet and MEF services, including E-Line, E-LAN and E-Tree services. Participants learn about legacy Ethernet limitations addressed by carrier Ethernet, as well as the key attributes and components of carrier Ethernet networks.
This document discusses segment routing and how it simplifies IP/MPLS networks. Segment routing encodes paths through a network as a list of segments carried in packet headers. This eliminates the need for protocols like RSVP-TE and LDP, reducing control plane complexity and overhead. Segment routing provides the same functionality as RSVP-TE for traffic engineering and fast rerouting, but with greater scalability for large networks. The main challenges are ensuring routers have large enough segment routing blocks and supporting deep label stacks on older router hardware.
“MPLS is that it’s a technique, not a service.”
The fundamental concept behind MPLS is that of labeling packets. In a traditional routed IP network,
each router makes an independent forwarding decision for each packet based solely on the packet’s
network-layer header. Thus, every time a packet arrives at a router, the router has to “think through”
where to send the packet next.
The document discusses the evolution of next generation IP transport networks using a Unified MPLS approach. Key points include:
- Unified MPLS aims to simplify MPLS operations in large, complex networks through common MPLS technology across domains and hierarchical BGP routing.
- It reduces the number of operational points needed for services by minimizing static configuration and integrating previously separate MPLS islands.
- The network is divided into IGP/LDP domains with inter-domain communication handled through labeled BGP routes. This reduces route tables and the number of label switched paths required in the access domains.
Multi Protocol Label Switching. (by Rahil Reyaz)RAHIL REYAZ
MPLS was developed to address some of the disadvantages of IP and ATM routing. It works by assigning labels to packets at the edge of the network which are then used to forward packets across the core. This label switching allows for faster forwarding than IP routing. MPLS can be used to engineer traffic flows, provide virtual private networks, and transport various layer 2 protocols over an IP or MPLS backbone. While it adds complexity, MPLS improves performance and supports quality of service and network scalability.
Multi-Protocol Label Switching (MPLS) allows packets to be forwarded along predetermined paths through a network based on short fixed-length labels rather than long variable-length IP addresses. MPLS is used by carriers and large enterprises to implement traffic engineering, virtual private networks, and quality of service through mechanisms like traffic classification and label switching along label switch paths.
This document describes a presentation on designing MPLS Layer 3 VPN networks, covering MPLS VPN technology overview, configuration, services such as multihoming and hub-and-spoke, and best practices. The presentation discusses how MPLS VPNs use VRFs, MP-BGP, and label switching to provide scalable VPN services to enterprises by separating routing and forwarding tables for each customer VPN. Sample MPLS VPN configurations for PE, P, and route reflector routers are also provided.
The document provides an introduction to MPLS (Multi-Protocol Label Switching) covering its definition, advantages, architecture, labels, label switching path setup, and forwarding operations. Key points include:
- MPLS encapsulates packets with short fixed-length labels to enable faster forwarding based on the label rather than the IP address.
- MPLS decouples routing from forwarding and supports traffic engineering and virtual private networks.
- The MPLS architecture consists of label edge routers, label switch routers, label distribution protocols, and label forwarding tables.
- Labels are assigned and distributed to establish label switched paths for forwarding packets across the MPLS network.
An introduction to MPLS networks and applicationsShawn Zandi
Multiprotocol Label Switching (MPLS) provides label switched path to deliver packets in networks. This is an introduction course to understand different terminologies and concepts associated with MPLS.
Segment routing allows a node to steer a packet through an ordered list of segments encoded in the packet header. Segments represent instructions like forwarding through specific nodes or along certain paths. By encoding the path in packets, segment routing can compute paths centrally and reduce network state.
LDP allows MPLS routers to exchange label mapping information by establishing LDP sessions between peers. LDP defines procedures and messages for routers to advertise label bindings and establish label switched paths for forwarding traffic. LDP sessions can be directly connected over a single hop or nondirectly connected over multiple hops using targeted Hellos.
The document is a tutorial on L2VPN (Layer 2 Virtual Private Networks) that provides an agenda covering introductions, concepts, transports, services, pseudowire stitching, QoS, and demonstrations. It defines L2VPN as providing an end-to-end layer 2 connection across a service provider's MPLS or IP core, allowing legacy services like Frame Relay and ATM to be migrated to an MPLS/IP infrastructure. It also describes the need for L2VPN, models like VPLS and VPWS, basic building blocks of pseudowires, and control plane requirements.
Tutorial about MPLS Implementation with Cisco Router, this first of two chapter discuss about What is MPLS, Network Design, P, PE, and CE Router Description, Case Study of IP MPLS Implementation, IP and OSPF Routing Configuration
This slide contains basic concept about MPLS and LDP protocol, according to the latest version of Cisco books(SP and R&S) and i taught it at IRAN TIC company.
i will prepare MPLS_VPN and MPLS_QoS and MPLS_TE later.
MPLS enables packets to be forwarded based on labels rather than IP addresses. PE routers add labels to incoming packets and remove labels from outgoing packets. P routers swap or pop labels to forward packets. MPLS with L3 VPN allows private networks in different locations to communicate securely over a shared infrastructure by associating routes with virtual routing instances (VRFs) and advertising them using BGP. An example configuration shows VRF and BGP configuration, along with commands to view MPLS label bindings and packet forwarding information.
MPLS provides mechanisms for traffic engineering by allowing routers to forward packets based on fixed-length labels rather than long variable length IP addresses. MPLS labels are assigned to packets at ingress routers and swapped or removed by transit and egress routers along the Label Switched Path (LSP). Routers can be configured with constraints and administrative groups to calculate optimal LSP paths using protocols like RSVP and LDP.
This document provides an overview and student guide for the "Implementing Cisco MPLS (MPLS) Version 2.2" course. It introduces basic MPLS concepts including the MPLS architecture, labels, label stacks, and applications such as MPLS VPNs and traffic engineering. It also covers frame-mode MPLS implementation on Cisco IOS platforms, including configuration, monitoring, and troubleshooting tasks. Finally, it discusses MPLS VPN technology in depth, including the MPLS VPN architecture, routing model, and packet forwarding mechanisms.
This document provides an overview of Multiprotocol Label Switching (MPLS), including its history, key concepts, applications, and use by service providers. MPLS was developed in the late 1990s to meet the needs of scalable routing and quality of service on the growing internet. It works by assigning fixed length labels to data packets, allowing routers to forward based on these labels rather than long network addresses. Major applications of MPLS include traffic engineering, virtual private networks, and bandwidth management. The document discusses how service providers like MegaPath use MPLS in their backbones to provide integrated data and voice services, and nationwide networking solutions for corporate customers.
Overview of the MPLS backbone transmission technology.
MPLS (MultiProtocol Layer Switching) is a layer 2.5 technology that combines the virtues of IP routing and fast layer 2 packet switching.
IP packet forwarding is not suited for high-speed forwarding due to the need to evaluate multiple routes for each IP packet in order to find the optimal route, i.e. the route with the longest prefix match.
However, Internet Protocol routing provides global reachability through the IP address and through IP routing protocols like BGP or OSPF.
Layer 2 packet switching has complementary characteristics in that it does not provide global reachability through globally unique addresses but allows fast packet forwarding in hardware through the use of small and direct layer 2 lookup addresses.
MPLS combines IP routing and layer 2 switching by establishing layer 2 forwarding paths based on routes received through IP routing protocols like BGP or OSPF.
Thus the control plane of an MPLS capable device establishes layer 2 forwarding paths while the data plane then performs packet forwarding, often in hardware.
MPLS is not a layer 2 technology itself, i.e. it does not define a layer 2 protocol but rather makes use of existing layer 2 technologies like Ethernet, ATM or Frame Relay.
Slides for lecturing in Alpha Networks Inc.
Introduce the routing mechanism in Trellis, namely Segment Routing, from the upper side of application design
and ONOS core functions, to the lower side of fabric pipelines and flows on OFDPA.
The 5-day course covers preparation for the MEF-CECP exam, focusing on carrier Ethernet concepts. Day 1 introduces carrier Ethernet and MEF services, including E-Line, E-LAN and E-Tree services. Participants learn about legacy Ethernet limitations addressed by carrier Ethernet, as well as the key attributes and components of carrier Ethernet networks.
This document discusses segment routing and how it simplifies IP/MPLS networks. Segment routing encodes paths through a network as a list of segments carried in packet headers. This eliminates the need for protocols like RSVP-TE and LDP, reducing control plane complexity and overhead. Segment routing provides the same functionality as RSVP-TE for traffic engineering and fast rerouting, but with greater scalability for large networks. The main challenges are ensuring routers have large enough segment routing blocks and supporting deep label stacks on older router hardware.
“MPLS is that it’s a technique, not a service.”
The fundamental concept behind MPLS is that of labeling packets. In a traditional routed IP network,
each router makes an independent forwarding decision for each packet based solely on the packet’s
network-layer header. Thus, every time a packet arrives at a router, the router has to “think through”
where to send the packet next.
The document discusses the evolution of next generation IP transport networks using a Unified MPLS approach. Key points include:
- Unified MPLS aims to simplify MPLS operations in large, complex networks through common MPLS technology across domains and hierarchical BGP routing.
- It reduces the number of operational points needed for services by minimizing static configuration and integrating previously separate MPLS islands.
- The network is divided into IGP/LDP domains with inter-domain communication handled through labeled BGP routes. This reduces route tables and the number of label switched paths required in the access domains.
Multi Protocol Label Switching. (by Rahil Reyaz)RAHIL REYAZ
MPLS was developed to address some of the disadvantages of IP and ATM routing. It works by assigning labels to packets at the edge of the network which are then used to forward packets across the core. This label switching allows for faster forwarding than IP routing. MPLS can be used to engineer traffic flows, provide virtual private networks, and transport various layer 2 protocols over an IP or MPLS backbone. While it adds complexity, MPLS improves performance and supports quality of service and network scalability.
Multi-Protocol Label Switching (MPLS) allows packets to be forwarded along predetermined paths through a network based on short fixed-length labels rather than long variable-length IP addresses. MPLS is used by carriers and large enterprises to implement traffic engineering, virtual private networks, and quality of service through mechanisms like traffic classification and label switching along label switch paths.
MPLS provides motivation to converge voice and data on a single network with increasing traffic demands. It works by assigning labels to packets based on forwarding equivalence classes. Labels are distributed through protocols like LDP and are used to forward packets along label switched paths through label swapping without deep packet inspection. MPLS enables features like traffic engineering, QoS, and virtual private networks.
This document provides an introduction and overview of MPLS (Multi-Protocol Label Switching). It defines MPLS, discusses why it was developed to address limitations in IP routing, and how it works by assigning labels to packets which are then forwarded based on the label rather than long IP address lookups. Key MPLS concepts covered include label edge routers, label switch routers, label switch paths, and protocols like LDP and RSVP-TE. Applications like traffic engineering and MPLS VPNs are also mentioned.
The document provides an introduction to MPLS (Multi-Protocol Label Switching) technology. It discusses the goals of MPLS including understanding the business drivers, market segments, problems addressed, benefits, and major components. The key components of MPLS technology are explained, including MPLS forwarding and signaling, label distribution protocols, MPLS network services like VPNs, QoS, and traffic engineering. An overview of typical MPLS applications is also provided.
The document provides an overview of MPLS (Multi-Protocol Label Switching) concepts and components. It discusses how MPLS separates routing from forwarding by using labels to forward packets based on the label rather than the IP address. It describes MPLS components like edge label switching routers (ELSR or PE), label switching routers (LSR or P), and the label distribution protocol (LDP). It also provides examples of MPLS forwarding and MPLS VPN operation.
This document provides an overview and study guide for the CCIP MPLS exam. It discusses key MPLS concepts like label distribution, label switching, and MPLS VPNs. The exam tests knowledge of MPLS fundamentals, frame and cell mode MPLS, MPLS VPN implementation, complex MPLS VPNs, and internet access from an MPLS VPN. It provides details on topics covered in the exam and guidance on how to prepare.
The document discusses using SDN and overlay networking techniques like VXLAN and EVPN to build flexible Layer 2 and Layer 3 VPN services. It proposes using SDN controllers to program "smart edge, dumb core" CPE devices and transport customer traffic over any underlying IP network in a virtualized manner. This approach aims to simplify VPN provisioning and interworking with traditional networks while improving scalability, control, and service chaining compared to traditional IP VPN models.
The document discusses MPLS (Multi-Protocol Label Switching) including traditional IP forwarding, IP over ATM, MPLS concepts, MPLS architecture, MPLS forwarding, MPLS applications, MPLS protocols, and forwarding equivalence classes. MPLS combines the advantages of connection-oriented forwarding with IP routing by assigning labels to packets and forwarding based on those labels rather than long IP addresses.
This document provides an introduction to MPLS (Multi-Protocol Label Switching). It discusses some of the limitations of traditional IP routing and forwarding and how MPLS aims to address these. MPLS uses label switching to establish label switched paths (LSPs) across networks in a way that is independent of the underlying link layer and network layer protocols. Key aspects of MPLS covered include label distribution protocols, traffic engineering capabilities, and explicit routing.
MPLS was developed to combine the fast packet forwarding capabilities of ATM with the flexibility of IP by using fixed-length labels to direct data packet through networks. MPLS uses label edge routers to assign labels to packets based on forwarding equivalence classes and distribute labels through protocols like LDP. Core label switching routers use label switching tables to forward packets based on their labels rather than long IP addresses. MPLS enables traffic engineering, QoS, and virtual private networks while maintaining independence from lower layer technologies.
This document provides an overview of routing protocols and concepts:
- It defines what a route is and explains that routing protocols are used to exchange route information between routers to direct packet flow.
- Key concepts covered include the routing table, static and dynamic routes, classification of routing protocols by area and algorithm, and route metrics.
- Fundamental routing functions like longest prefix matching and equal cost multipath routing are also summarized.
This document provides an overview of routing protocols and concepts:
- It defines what a route is and explains that routing protocols are used to exchange route information between routers to direct packet flow.
- Key concepts covered include the routing table, static and dynamic routes, classification of routing protocols by area and algorithm, and route metrics.
- It also discusses routing protocol preference, equal cost multi-path routing, and the longest prefix match method used to select routes.
The document discusses the business case for Layer 2 MPLS VPNs. It outlines how MPLS L2VPNs allow service providers to leverage their IP infrastructure while continuing to offer Frame Relay and ATM services to customers. MPLS L2VPNs provide Layer 2 connectivity and allow for a gradual migration to Ethernet and IP-based networks. The key benefits are reducing costs by consolidating services on a single IP infrastructure while maintaining revenue from existing Frame Relay/ATM customers.
This document provides an introduction to Multi-Protocol Label Switching (MPLS). It discusses the motivation for MPLS, which was to combine the forwarding abilities of ATM with the scalability of IP. The key components and protocols of MPLS are described, including label distribution, label switching routers, label edge routers, forwarding equivalence classes, and label switched paths. The operation of MPLS is explained in five steps - label creation and distribution, table creation, path creation, label insertion and lookup, and packet forwarding. Advantages of MPLS include improved performance, quality of service support, network scalability, and integration of different network types.
This document provides an overview of MPLS (Multi-Protocol Label Switching) including its motivation, basics, components, operation, and advantages/disadvantages. MPLS was created to combine the fast packet forwarding of ATM with the flexibility of IP by using labels to direct network traffic. Key components include label edge routers that apply/remove labels, label switching routers that forward based on labels, label distribution protocols to disseminate label mappings, and label switched paths that represent forwarding equivalency classes. MPLS allows for traffic engineering, quality of service, and network scalability.
The document discusses MPLS VPN and class of service capabilities for meeting demands on corporate networks. MPLS VPN uses label switching to create private networks over shared infrastructure. It allows flexibility, scalability, security and quality of service. Class of service differentiation and traffic prioritization help optimize application performance for voice, video and data.
This document provides an overview and tutorial on MPLS (Multi-Protocol Label Switching). It begins with an outline of topics to be covered, including label encapsulations, label distribution protocols, MPLS and ATM integration, and constraint-based routing with CR-LDP. It then delves into explanations of label substitution, MPLS terminology, forwarding equivalence classes, vanilla and explicit label switched paths, and MPLS encapsulation over different link layers like ATM, Frame Relay, and PPP/LAN. It also briefly discusses label distribution protocols and the IETF status. The document aims to explain the key concepts and mechanisms of MPLS.
Similaire à ODC010001 MPLS Basic Knowledge ISSUE1.5.ppt (20)
HCIA-HNTD Intermediate Training Materials V2.2.pdfRandyDookheran1
Link aggregation allows multiple physical links to be bundled together to form a single logical trunk link between two devices. This provides increased bandwidth and high availability. Link aggregation can operate in either a manual load balancing mode or static LACP mode. In manual mode, interfaces are manually configured for load balancing without LACP. In static LACP mode, devices negotiate aggregation parameters and determine active and inactive member links using LACP packets.
Exploring IP Routing and Ethernet Bridging.pdfRandyDookheran1
This document provides a summary of a course on exploring IP routing and Ethernet bridging. The course examines IP routing protocols and Ethernet bridging technologies. It explores how IP and Ethernet networks can converge to extend services. The course aims to help students understand how routing and bridging techniques integrate within modern network architectures.
Configuration Guide - IP Multicast(V600R001C00_04) - NE80E40E.pdfRandyDookheran1
This document provides a configuration guide for IP multicast on HUAWEI NetEngine80E/40E routers. It describes IP multicast fundamentals and features supported by the routers. The document includes chapters on configuring IPv4 and IPv6 multicast protocols and functions like IGMP, PIM, multicast routing, and multicast VPN. It also provides configuration examples and maintenance guidelines.
This document provides an overview of Access Control Lists (ACLs) and how to configure them on Huawei routers. It defines ACLs as sets of rules that classify packets and filter them according to source/destination addresses and ports. The document discusses ACL principles like structure, matching mechanisms, classifications based on numbering, IP versions, and rule definition methods. It also covers ACL configuration tasks like setting the step value to determine rule identifiers. The overall purpose of ACLs is to control network access, prevent attacks, and ensure security and quality of service.
This document provides an overview of OSPF configuration and features. It describes how to configure multiple OSPF areas on routers and validate the routing tables. Key aspects covered include OSPF packet types, basic features like route updates and ECMP support, defining areas, router types, configuring networks on interfaces in different areas, and using commands to display neighbor relationships and routing tables. The goal is to help readers understand how to set up an OSPF routing domain with multiple areas.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Dive into the realm of operating systems (OS) with Pravash Chandra Das, a seasoned Digital Forensic Analyst, as your guide. 🚀 This comprehensive presentation illuminates the core concepts, types, and evolution of OS, essential for understanding modern computing landscapes.
Beginning with the foundational definition, Das clarifies the pivotal role of OS as system software orchestrating hardware resources, software applications, and user interactions. Through succinct descriptions, he delineates the diverse types of OS, from single-user, single-task environments like early MS-DOS iterations, to multi-user, multi-tasking systems exemplified by modern Linux distributions.
Crucial components like the kernel and shell are dissected, highlighting their indispensable functions in resource management and user interface interaction. Das elucidates how the kernel acts as the central nervous system, orchestrating process scheduling, memory allocation, and device management. Meanwhile, the shell serves as the gateway for user commands, bridging the gap between human input and machine execution. 💻
The narrative then shifts to a captivating exploration of prominent desktop OSs, Windows, macOS, and Linux. Windows, with its globally ubiquitous presence and user-friendly interface, emerges as a cornerstone in personal computing history. macOS, lauded for its sleek design and seamless integration with Apple's ecosystem, stands as a beacon of stability and creativity. Linux, an open-source marvel, offers unparalleled flexibility and security, revolutionizing the computing landscape. 🖥️
Moving to the realm of mobile devices, Das unravels the dominance of Android and iOS. Android's open-source ethos fosters a vibrant ecosystem of customization and innovation, while iOS boasts a seamless user experience and robust security infrastructure. Meanwhile, discontinued platforms like Symbian and Palm OS evoke nostalgia for their pioneering roles in the smartphone revolution.
The journey concludes with a reflection on the ever-evolving landscape of OS, underscored by the emergence of real-time operating systems (RTOS) and the persistent quest for innovation and efficiency. As technology continues to shape our world, understanding the foundations and evolution of operating systems remains paramount. Join Pravash Chandra Das on this illuminating journey through the heart of computing. 🌟
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...alexjohnson7307
Predictive maintenance is a proactive approach that anticipates equipment failures before they happen. At the forefront of this innovative strategy is Artificial Intelligence (AI), which brings unprecedented precision and efficiency. AI in predictive maintenance is transforming industries by reducing downtime, minimizing costs, and enhancing productivity.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
This presentation provides valuable insights into effective cost-saving techniques on AWS. Learn how to optimize your AWS resources by rightsizing, increasing elasticity, picking the right storage class, and choosing the best pricing model. Additionally, discover essential governance mechanisms to ensure continuous cost efficiency. Whether you are new to AWS or an experienced user, this presentation provides clear and practical tips to help you reduce your cloud costs and get the most out of your budget.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Tatiana Kojar
Skybuffer AI, built on the robust SAP Business Technology Platform (SAP BTP), is the latest and most advanced version of our AI development, reaffirming our commitment to delivering top-tier AI solutions. Skybuffer AI harnesses all the innovative capabilities of the SAP BTP in the AI domain, from Conversational AI to cutting-edge Generative AI and Retrieval-Augmented Generation (RAG). It also helps SAP customers safeguard their investments into SAP Conversational AI and ensure a seamless, one-click transition to SAP Business AI.
With Skybuffer AI, various AI models can be integrated into a single communication channel such as Microsoft Teams. This integration empowers business users with insights drawn from SAP backend systems, enterprise documents, and the expansive knowledge of Generative AI. And the best part of it is that it is all managed through our intuitive no-code Action Server interface, requiring no extensive coding knowledge and making the advanced AI accessible to more users.
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
ODC010001 MPLS Basic Knowledge ISSUE1.5.ppt
1. HUAWEI TECHNOLOGIES CO., LTD. All rights reserved
www.huawei.com
Internal
ODC010001 MPLS Basic
Knowledge
ISSUE 1.5
2. HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 1
The course introduce the basic concept
of MPLS, including MPLS label, MPLS
switching, MPLS label allocating.
3. HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 2
Upon completion of this course, you
will be able to:
Describe the switching process of
MPLS, the method to allocate and
control the label.
4. HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 3
Chapter 1 MPLS Overview
Chapter 2 Label and Label Stack
Chapter 3 Label Forwarding and Allocation
5. HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 4
MPLS
MPLS——Multi-Protocol Label Switching
Multi-Protocol
Support multiple Layer-3 protocols, such as IP, IPv6, IPX,
SNA
Label Switching
Label packets, and replace IP forwarding with label
switching
6. HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 5
Origin: To Integrate IP with ATM
Connectionless
control plane
Connectionless
forwarding plane
IP
Connection-oriented
control plane
Connection-oriented
forwarding plane
ATM
Connectionless
control plane
Connection-oriented
forwarding plane
MPLS
7. HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 6
Connection-oriented Features
Connectionless: packet route
Path 1 = S1, S2, S6, S8
Path 2 = S1, S4, S7, S8
The data reach their destination
out of order along different
paths
connection-oriented: cell switching
VC = S1, S4, S7, S8
The data reach their destination in
order along the same connection
Fixed time delay, easy to control
Connection types: PVC SVC
S2 S6
S4 S7
S3 S5
S1 S8
1
1
1
2 2
2
S2 S6
S4 S7
VC
S1 S8
S3 S5
8. HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 7
Traditional IP Forwarding
IP header is parsed at each hop, resulting in low efficiency.
It is hard to deploy QoS and the efficiency is rather low.
All routers are expected to know all routes in the entire network.
Parse IP header
mapped to next hop
Parse IP header
mapped to next hop
Parse IP header
mapped to next hop
9. HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 8
Virtual Channel Connection (VCC)
VC
switching
VC
switching
NNI NNI
VPI = 2
VCI = 44
VPI = 1
VCI = 1
VPI = 26
VCI = 44
VPI = 20
VCI = 30
UNI
UNI
ATM Switching Process
Connection-oriented, N2 problem
Routing depending on link layer, based on VPI/VCI or label
Ensure QoS and real-time service
10. HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 9
Technology Combining the Advantages of ATM and IP
+ X
R = X
Router ATM switch MPLS
Router
MPLS——multi-protocol label switching
Layer 3 routing – scalable and flexible
Layer 2 switching – High reliability and traffic engineering
management
12. HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 11
Core LSR
Basic Working Process of MPLS
IP IP L1 IP L2 IP L3 IP
Traditional IP
forwarding
Traditional
IP forwarding Label forwarding
Edge LSR Edge LSR
13. HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 12
MPLS Advantages
Replace IP header with short and fixed-length labels as
forwarding basis to improve forwarding speed
Better integrate IP with ATM
Provide value-added service without prejudice to efficiency:
VPN
Traffic engineering
QOS
14. HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 13
Exercise-1
1. What is MPLS?
2. Describe the core function of MPLS
3. Describe LER, LSR and LSP
15. HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 14
Chapter 1 MPLS Overview
Chapter 2 Label and Label Stack
Chapter 3 Label Forwarding and Allocation
16. HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 15
MPLS Encapsulation Format and Label
MPLS header
Layer 2
header
IP header Data
Label S
EXP TTL
20
0 23 24 31
32 bits
17. HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 16
Label Values
Special use and reserved range
− 0: IPv4 explicit null, label stack must be popped
− 1: Router alert, local processing operation
− 2: IPv6 explicit null, label stack must be popped
− 3: Implicit null, triggers label stack pop, overrides label swap
− 4 to 15: reserved
General use range
− 16 to 1,048,575
18. HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 17
Label Position in Packet
Ethernet header
/PPP header Label Layer-3 data
Ethernet
/SONET
/SDH packet
ATM header Label Layer-3 data
Frame mode
ATM packet
Cell mode
ATM packet VPI/VCI Layer-3 data
Two types of MPLS encapsulation for ATM and FR:
shim encapsulation: similar to other link layers
Cell mode: VC (VPI/VCI for ATM, DLCI for FR) is directly
used as the label
19. HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 18
Label Spaces and Identifiers
Label space is a set of interface-specific or platform-wide labels
Platform-wide: One pool of labels is shared across all interfaces
Per-interface: Label values can be reused on each interface
Label space
Label space ID—Zero for platform-wide label space (2 octets)
For example, 192.168.1.1:0 (platform-wide), 192.168.1.1:5 (per-interface)
MPLS based frame mode use Platform-wide label space, such as IP,
Ethernet.
MPLS based cell mode use Per-interface label space, such as ATM.
20. HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 19
MPLS TTL Processing
Regard the entire MPLS domain as one hop
IP TTL --
MPLS TTL=255 MPLS TTL -- IP TTL --
Ingress LER LSR Egress LER
Include MPLS TTL in IP TTL
IP TTL --
MPLS TTL=IP TTL MPLS TTL --
MPLS TTL --
IP TTL=MPLS TTL
Ingress LER LSR Egress LER
21. HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 20
LSP Loop Detection
Path looping shall be avoided even in setting up LSP within the
MPLS domain.
LSP path looping can be avoided in two ways:
Maximum hop number;
Path vector
LSRA LSRB LSRC LSRX
1 2 3 32
LSRA LSRB
LSRA
LSRC
LSRA,LSRB
LSRA,LSRB…..
LSRA,LSRB…..LSRC
22. HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 21
Label Stack
Theoretically, label stack enables limitless nesting to provide
infinite service support. This is simply the greatest advantage
of MPLS technology.
MPLS
header
Layer2
header IP header Data
MPLS
header
23. HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 22
Exercise-2
1. Describe MPLS label structure
2. Describe label position with different encapsulation mode
3. Describe two LSP loop detection methods
24. HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 23
Chapter 1 MPLS Overview
Chapter 2 Label and Label Stack
Chapter 3 Label Forwarding and Allocation
25. HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 24
Basic Concepts of Label Forwarding
FEC (Forwarding Equivalence Class): Import the packets with
identical characteristics into the same LSP
NHLFE (Next Hop Label Forwarding Entry): Describe label
operations
next hop
label operation types: push/pop/swap/null
Link layer encapsulation types
FTN (FEC to NHLFE): Map FEC to NHLFE
ILM (Incoming Label Map): Map MPLS label to NHLFE
26. HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 25
Label Forwarding
The traditional routing protocol and Label Distribution Protocol (LDP) serve to create routing table
and label mapping table (FEC-Label mapping) in each LSR for FECs with service requirement,
i.e. create LSP successfully.
Ingress LER receives a packet, determines the FEC that the packet belongs to, and label the
packet
In MPLS domain, packets are forwarded in accordance with labels and label forwarding table via
the forwarding unit
Egress LER removes the label and continues forwarding the packet
Parse IP header
FEC bound with LSP
FTN->NHLFE
ILM->NHLFE
ILM->NHLFE
Parse IP header
distribute FEC
mapped to next hop
ILM->NHLFE
Ingress LER LSR LSR Egress LER
Label operation: push
Label operation: swap Label operation: swap
label operation: pop
A B C D
27. HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 26
NHLFE
A:
…
Add label L1
E1
B
10.0.1.0/24
Others
Label operation
Transmitting interface
next hop
NHLFE
FEC
…
Remove the previous label and add L2
E1
C
L1
Others
label operation
Transmitting interface
Next hop
NHLFE
Ingress
label
B:
…
Remove the previous label and add L3
D
L2
Others
Label operation
Next hop
NHLFE
Ingress
label
C:
E1
Transmitting interface
28. HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 27
Penultimate Hop Popping (PHP)
The label at the outmost layer does not make any sense to the last hop. Thus, it
is advisable to pop the label at the last hop but one to ease the burden of the last
hop.
If there is only one layer of label, the last hop will perform IP forwarding directly;
otherwise, it will perform the internal label forwarding.
Parse IP header
Distribute FEC
Mapped to next hop
Label operation: pop
Parse IP header
FEC bound with LSP
FTN->NHLFE ILM->NHLFE ILM->NHLFE
Ingress LER LSR LSR Egress LER
Label operation: push
Label operation: swap
29. HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 28
Creating LSP
LSP drive modes:
Driven by stream: incoming packets drive LSP creation
Driven by topology: topology information (route) drives LSP creation
Driven by application: application (like QoS) drives LSP creation
Signaling protocol is used to distribute labels between LSRs and
establish LSP:
LDP: Label Distribution Protocol
CR-LDP: Constrained Route LDP
RSVP-TE
MP-BGP
PIM
30. HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 29
Several Issues Concerning Label Distribution
Label allocation mode
DoD : downstream-on-demand
DU: downstream unsolicited
Label control mode
Ordered
Independent
Label retention mode
Conservative retention mode : upon receiving a label, if there is no
route destined for corresponding FEC, discard the label.
Liberal mode: upon receiving a label, if there is no route destined for
the corresponding FEC, hold the label for later use.
31. HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 30
Label Allocation Mode: DoD
Upstream Downstream
The upstream LSR sends a label request (containing FEC description
information) to the downstream LSR.
The downstream LSR allocates a label to this FEC and feeds back the bound
label to the upstream LSR via the label mapping message.
171.68.10.0/24
171.68.40.0/24
LSR1 LSR2 LSR3
请求到目的地址
171.68.10/24 的标签
Requesting labels destined
for 171.68.10.0/24 的标签
Requesting labels
destined for 171.68.10.0/24
分配到171.68.10/24
的标签为
20
Label 20 is allocated
to 171.68.10.0/24
分配到171.68.10/24
的标签为18
Label 18 is
allocated to
171.68.10.0/24
Route triggering
32. HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 31
Label Allocation Mode: DU
Upstream
Downstream
Route
triggering
Once the LDP session is set up successfully, the downstream LSR will
initiatively advertise the label mapping message to its upstream LSR.
The upstream router will save the label in the label mapping table.
到171.68.10/24
可以使用标签 20
Label 20 can be used
to reach
171.68.10.0/24
171.68.10.0/24
171.68.40.0/24
Label 18 can be used
to reach
171.68.10.0/24
33. HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 32
Label Control Mode: Ordered
Not until it receives a label mapping message from its downstream
LSP will it send the message upstream
Upstream Downstream
DOD+ Ordered
Upstream Downstream
DU+ Ordered
34. HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 33
Label Control Mode: Independent
Upstream Downstream
Whether it receives a label mapping message from its downstream LSR, it will
send upstream a label mapping message immediately.
Upstream Downstream
DOD+ independent
DU+ independent
35. HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 34
Label Retention: Conservative Retention Mode
An LSR stores only the labels received from next-hop LSRs; all
other labels are ignored.
LSR1 LSR2 LSR3 LSR4
LSR5
172.16.2/24
mapping
label 20
mapping
label 30
mapping
label 17
mapping
label 16
Drop
36. HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 35
Label Retention: Liberal Retention Mode
LSR1 LSR2 LSR3 LSR4
LSR5
172.16.2/24
mapping
label 20
mapping
label 30
mapping
label 17
mapping
label 16
store
Every LSR stores the received label in its LIB, even when the label
is not received from a next-hop LSR.
37. HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 36
Common Collocation 1: DoD + Ordered + Conservative
Upstream Downstream
It is relatively easy to control the use of labels and the creation of LSPs
ATM/FR frame mode can only use DoD
38. HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 37
Common Collocation 2: DU + Ordered + Liberal
Upstream Downstream
A waste of label resources
Useless LSPs would be created
Label merge is required at branches
LSPs can be set up quickly and reliably
39. HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 38
Label Forwarding Table
IN interface IN label Prefix/MASK OUT interface
(next hop)
OUT label
Serial0 50 10.1.1.0/24 Eth0(3.3.3.3) 80
Serial1 51 10.1.1.0/24 Eth0(3.3.3.3) 80
Serial1 62 70.1.2.0/24 Eth0(3.3.3.3) 52
Serial1 52 20.1.2.0/24 Eth1(4.4.4.4) 52
Serial2 77 30.1.2.0/24 Serial3(5.5.5.5) 3(pop)
The “in” and “out” is correspond to the label swap,not the label
distribution.
The in label is that I distribute to the others, I will not put it to
the packet
The out label is the others distribute to me, I will put it to the
packet
40. HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 39
Exercise-3
1. Describe MPLS label switching process
2. Describe MPLS label distribution work mode: allocation, control
and retention.
41. HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 40
Grasp the basic concepts and working
process of MPLS
Grasp label allocation and distribution
Summary