This slide contains concept about MPLS_VPNs specially L3_VPN protocol, according to the latest version of Cisco books(SP and R&S) and i taught it at IRAN TIC company.
In the next slide, i prepare title about MPLS L3_VPN Services and VPLS (MPLS L2_VPN)
Segment routing is a technology that is gaining popularity as a way to simplify MPLS networks. It has the benefits of interfacing with software-defined networks and allows for source-based routing. It does this without keeping state in the core of the network and needless to use LDP and RSVP-TE.
This slide contains concept about MPLS_VPNs specially L3_VPN protocol, according to the latest version of Cisco books(SP and R&S) and i taught it at IRAN TIC company.
In the next slide, i prepare title about MPLS L3_VPN Services and VPLS (MPLS L2_VPN)
Segment routing is a technology that is gaining popularity as a way to simplify MPLS networks. It has the benefits of interfacing with software-defined networks and allows for source-based routing. It does this without keeping state in the core of the network and needless to use LDP and RSVP-TE.
Tutorial about MPLS Implementation with Cisco Router, this first of two chapter discuss about What is MPLS, Network Design, P, PE, and CE Router Description, Case Study of IP MPLS Implementation, IP and OSPF Routing Configuration
This slide contains basic concept about MPLS and LDP protocol, according to the latest version of Cisco books(SP and R&S) and i taught it at IRAN TIC company.
i will prepare MPLS_VPN and MPLS_QoS and MPLS_TE later.
this slide contains fundamental concept about VPLS protocol, according to the latest version of Cisco books and i taught it at IRAN TIC company.in the next slide, i upload attractive advanced feature about VPLS.
(Some of the pictures in this slide are borrowed from the wonderful site of my good friend Gokhan Kosem)
(www.ipcisco.com)
Overview of the MPLS backbone transmission technology.
MPLS (MultiProtocol Layer Switching) is a layer 2.5 technology that combines the virtues of IP routing and fast layer 2 packet switching.
IP packet forwarding is not suited for high-speed forwarding due to the need to evaluate multiple routes for each IP packet in order to find the optimal route, i.e. the route with the longest prefix match.
However, Internet Protocol routing provides global reachability through the IP address and through IP routing protocols like BGP or OSPF.
Layer 2 packet switching has complementary characteristics in that it does not provide global reachability through globally unique addresses but allows fast packet forwarding in hardware through the use of small and direct layer 2 lookup addresses.
MPLS combines IP routing and layer 2 switching by establishing layer 2 forwarding paths based on routes received through IP routing protocols like BGP or OSPF.
Thus the control plane of an MPLS capable device establishes layer 2 forwarding paths while the data plane then performs packet forwarding, often in hardware.
MPLS is not a layer 2 technology itself, i.e. it does not define a layer 2 protocol but rather makes use of existing layer 2 technologies like Ethernet, ATM or Frame Relay.
“MPLS is that it’s a technique, not a service.”
The fundamental concept behind MPLS is that of labeling packets. In a traditional routed IP network,
each router makes an independent forwarding decision for each packet based solely on the packet’s
network-layer header. Thus, every time a packet arrives at a router, the router has to “think through”
where to send the packet next.
التلوث الإشعاعي
و المضاعفات الصحية لحروب الخليج
- الإصدار : الأول
- الطبعة : الأولى
- الصفحات:133
- الحجم : 8.5*11
- سنة النشر 2015
إضـــــــــاءات ...
هي سلسلة ملفات إلكترونية صممتها منظمة المجتمع العلمي العربي ليسلط
كل منها الضوء على موضوع معين يهم الباحث و المتصفح العربي.
نتمنى أن تجدوا فيها الفائدة و المتعة
ــ ـــــــــ
في هذا الملف نستعرض التلوث الاشعاعي في العراق و الآثار الصحية له، على أمل أن يحرك ذلك ساكناً و دعوة لاتخاذ إجراءات فورية و فاعلة على كافة المستويات الرسمية و العلمية و الشعبية و ندعو لعمل عربي مشترك لإنقاذ مستقبل أجيالنا.
بعد مرور أكثر من اثني عشرة سنة على الحرب الهمجية التي قامت بها الولايات المتحدة و حلفاؤها على العراق، لا تزال آثار تلك الحرب الحاقدة على هذه الأمة تؤتي أُكلها، و مازال اليورانيوم المنضب يقذف سمّه من مناطق متعددة من العراق و ما حولها، سرطانات و تشوهات لأطفال ولدوا بعد انقضائها.
اليورانيوم عنصر مشع و يوجد في مناطق متعددة من القشرة الأرضية، و قد ازداد الاهتمام به و البحث عنه بعد استخدامه كوقود لمحطات الطاقة النووية و استخدامه في الأسلحة.
اليورانيوم المخضب يستخدم كذخيرة في القذائف الخارقة للدروع، و هو أقل اشعاعاً بحوالي 40% من اليورانيوم الطبيعي، و لكنه مع ذلك يشكل خطراً كبيراً على حياة و صحة الإنسان.
لقد حددت منظمة الصحة العالمية (WHO) الجرعة المسموح تعرض الناس لها بمقدار 1 ميللي سيفرت في السنة، و لكن علماء البيئة استطاعوا قياس مستويات عالية من اليورانيوم في عينات من التربة من عدة مناطق في العراق. و قد ربطوا تلك القياسات و النتائج التي توصلوا إليها بالزيادة الكبيرة في أعداد المصابين بأمراض السرطان المسجلة في السجلات الوطنية للسرطان في العراق عامة و التي بدأ التسجيل فيها منذ 1975.
و قد استنتجوا أن الحربين الدوليتين بقيادة الولايات المتحدة على العراق في عامي 1991 و 2003 و اللتين استخدمت فيهما قذائف اليورانيوم المخضب قد تركتا إرثاً وخيماً على صحة المدنيين العراقيين بشكل عام و بزيادة السرطانات و التشوهات الخلقية في المواليد بشكل خاص. و في تقرير لمنظمة الصحة العالمية يذكر أن معدل الإصابة بالسرطان لدى الأطفال و خاصة سرطان الدم في العراق أعلى بعشر مرات من نظيره في الدول الصناعية.
كما حذروا من أن التلوث الاشعاعي للتربة يمكنه الانتشار بسهولة إلى مناطق مختلفة بفعل الرياح و الغبار، و هذا ليس مقتصراً على العراق بل و إلى الدول المجاورة.
و الأمر لا يقتصر على اليورانيوم المخضب فحسب بل لقد استخدمت أنواع عديدة من ا
Tutorial about MPLS Implementation with Cisco Router, this first of two chapter discuss about What is MPLS, Network Design, P, PE, and CE Router Description, Case Study of IP MPLS Implementation, IP and OSPF Routing Configuration
This slide contains basic concept about MPLS and LDP protocol, according to the latest version of Cisco books(SP and R&S) and i taught it at IRAN TIC company.
i will prepare MPLS_VPN and MPLS_QoS and MPLS_TE later.
this slide contains fundamental concept about VPLS protocol, according to the latest version of Cisco books and i taught it at IRAN TIC company.in the next slide, i upload attractive advanced feature about VPLS.
(Some of the pictures in this slide are borrowed from the wonderful site of my good friend Gokhan Kosem)
(www.ipcisco.com)
Overview of the MPLS backbone transmission technology.
MPLS (MultiProtocol Layer Switching) is a layer 2.5 technology that combines the virtues of IP routing and fast layer 2 packet switching.
IP packet forwarding is not suited for high-speed forwarding due to the need to evaluate multiple routes for each IP packet in order to find the optimal route, i.e. the route with the longest prefix match.
However, Internet Protocol routing provides global reachability through the IP address and through IP routing protocols like BGP or OSPF.
Layer 2 packet switching has complementary characteristics in that it does not provide global reachability through globally unique addresses but allows fast packet forwarding in hardware through the use of small and direct layer 2 lookup addresses.
MPLS combines IP routing and layer 2 switching by establishing layer 2 forwarding paths based on routes received through IP routing protocols like BGP or OSPF.
Thus the control plane of an MPLS capable device establishes layer 2 forwarding paths while the data plane then performs packet forwarding, often in hardware.
MPLS is not a layer 2 technology itself, i.e. it does not define a layer 2 protocol but rather makes use of existing layer 2 technologies like Ethernet, ATM or Frame Relay.
“MPLS is that it’s a technique, not a service.”
The fundamental concept behind MPLS is that of labeling packets. In a traditional routed IP network,
each router makes an independent forwarding decision for each packet based solely on the packet’s
network-layer header. Thus, every time a packet arrives at a router, the router has to “think through”
where to send the packet next.
التلوث الإشعاعي
و المضاعفات الصحية لحروب الخليج
- الإصدار : الأول
- الطبعة : الأولى
- الصفحات:133
- الحجم : 8.5*11
- سنة النشر 2015
إضـــــــــاءات ...
هي سلسلة ملفات إلكترونية صممتها منظمة المجتمع العلمي العربي ليسلط
كل منها الضوء على موضوع معين يهم الباحث و المتصفح العربي.
نتمنى أن تجدوا فيها الفائدة و المتعة
ــ ـــــــــ
في هذا الملف نستعرض التلوث الاشعاعي في العراق و الآثار الصحية له، على أمل أن يحرك ذلك ساكناً و دعوة لاتخاذ إجراءات فورية و فاعلة على كافة المستويات الرسمية و العلمية و الشعبية و ندعو لعمل عربي مشترك لإنقاذ مستقبل أجيالنا.
بعد مرور أكثر من اثني عشرة سنة على الحرب الهمجية التي قامت بها الولايات المتحدة و حلفاؤها على العراق، لا تزال آثار تلك الحرب الحاقدة على هذه الأمة تؤتي أُكلها، و مازال اليورانيوم المنضب يقذف سمّه من مناطق متعددة من العراق و ما حولها، سرطانات و تشوهات لأطفال ولدوا بعد انقضائها.
اليورانيوم عنصر مشع و يوجد في مناطق متعددة من القشرة الأرضية، و قد ازداد الاهتمام به و البحث عنه بعد استخدامه كوقود لمحطات الطاقة النووية و استخدامه في الأسلحة.
اليورانيوم المخضب يستخدم كذخيرة في القذائف الخارقة للدروع، و هو أقل اشعاعاً بحوالي 40% من اليورانيوم الطبيعي، و لكنه مع ذلك يشكل خطراً كبيراً على حياة و صحة الإنسان.
لقد حددت منظمة الصحة العالمية (WHO) الجرعة المسموح تعرض الناس لها بمقدار 1 ميللي سيفرت في السنة، و لكن علماء البيئة استطاعوا قياس مستويات عالية من اليورانيوم في عينات من التربة من عدة مناطق في العراق. و قد ربطوا تلك القياسات و النتائج التي توصلوا إليها بالزيادة الكبيرة في أعداد المصابين بأمراض السرطان المسجلة في السجلات الوطنية للسرطان في العراق عامة و التي بدأ التسجيل فيها منذ 1975.
و قد استنتجوا أن الحربين الدوليتين بقيادة الولايات المتحدة على العراق في عامي 1991 و 2003 و اللتين استخدمت فيهما قذائف اليورانيوم المخضب قد تركتا إرثاً وخيماً على صحة المدنيين العراقيين بشكل عام و بزيادة السرطانات و التشوهات الخلقية في المواليد بشكل خاص. و في تقرير لمنظمة الصحة العالمية يذكر أن معدل الإصابة بالسرطان لدى الأطفال و خاصة سرطان الدم في العراق أعلى بعشر مرات من نظيره في الدول الصناعية.
كما حذروا من أن التلوث الاشعاعي للتربة يمكنه الانتشار بسهولة إلى مناطق مختلفة بفعل الرياح و الغبار، و هذا ليس مقتصراً على العراق بل و إلى الدول المجاورة.
و الأمر لا يقتصر على اليورانيوم المخضب فحسب بل لقد استخدمت أنواع عديدة من ا
The literal meaning of Ganj-ul-Asrar is “The Treasure of Divine Secrets”. The writer Sultan-ul-Arifeen Hazrat Sakhi Sultan Bahoo has very conveniently and interestingly disclosed these secrets in the book. The most impressive aspect of Hazrat Sultan Bahoo’s writing is that he follows an entirely different style of writing in all his books, which is always pleasing and captivating. Every reader derives spiritual beneficence from his words, at whichever mystic level he maybe. In this particular book Hazrat Sultan Bahoo has explained the marvels of his Sarwari Qadri Order in a very easy to understand manner and described the grandeur of Sarwari Qadri Spiritual Guide and his disciples.
THE QURAN, a book which brings glad tidings to mankind along with divine admonition, stresses the
importance of man’s discovery of truth on both spiritual and intellectual planes.
Every book has its objective and the objective of the Quran is to make man aware of the Creation plan of God.
That is, to tell man why God created this world; what the purpose is of settling man on earth; what is required
from man in his pre-death life span, and what he is going to confront after death. The purpose of the Quran is to
make man aware of this reality, thus serving to guide man on his entire journey through life into the after-life.
The main themes of the Quran are enlightenment, closeness to God, peace and spirituality. The Quran uses
several terms, tawassum, tadabbur, and tafakkur, which indicate the learning of lessons through reflection,
thinking and contemplation on the signs of God scattered across the world. The present translation of the Quran
has been done keeping in mind these very themes.
This lesson describes the concept of VPN and introduces some VPN terminology.
Importance
This lesson is the foundation lesson for the MPLS VPN Curriculum.
Objectives
Upon completion of this lesson, the learner will be able to perform the following
tasks:
■ Describe the concept of VPN
■ Explain VPN terminology as defined by MPLS VPN architecture
Best CCIE (ENCOR 350-401) Training at NS3EDUNs3Edu
Excel in CCIE (ENCOR 350-401) Training with Top-tier Instruction"
Prepare for success with our premier CCIE (ENCOR 350-401) training program. Led by expert instructors, our comprehensive course covers all aspects of the exam, ensuring you're equipped with the knowledge and skills needed to excel. Join us and take your networking career to new heights.
Advanced Topics and Future Directions in MPLS Cisco Canada
This session presents the most recent extensions to the MPLS architecture. The material has a special focus on standardization and forward – looking directions for the evolution of the technology.
Master CCNP Collaboration with Top-tier Training in Gurgaon"
Embark on a journey to excellence with our premier CCNP Collaboration training program in Gurgaon. Led by industry experts, our comprehensive course covers all aspects of collaboration technologies, equipping you with the skills and knowledge needed to excel in today's dynamic workplace. Join us and take your career to new heights in the field of collaboration.
CCNA Routing and Switching IT CertificationsMuhammad Qasim
Cisco CCNA Routing and Switching certification program provides the education and training required for installing, monitoring, and troubleshooting network infrastructure products designed by the industry leader in IP networking.
PLNOG14: Evolved Programmable Network, architektura dla sieci operatorskich -...PROIDEA
Krzysztof Konkowski - Cisco Systems
Language: English
Service Provider networks evolve to benefit from virtualisation, programmability, automation and other cutting edge technologies, enabling SPs to streamline their services and keep profitable on competitive market. Being able to adopt new technologies is bound to alleging network architecture, adding new components on top of Access, Aggregation, Core, and Service Edge. Cisco for past years has been developing CVD program - Cisco Validated Design. One of the work groups is dedicated to creating and maintaining EPN solution - Evolved Programmable Network - along with documentation based on cyclic test campaigns, Design & Implementation Guides, and other information. The session will cover EPN - its fundamental blocks, scenarios & equipment tested, where to search for information and how to use them.
Register for the next PLNOG edition: krakow.plnog.pl
"🚀 Reach New Heights: Join the Best CCIE (SPCOR 350-501) Training at Ns3Edu! ...Ns3Edu
"Ready to soar to new heights in your networking career? 🚀 Look no further than Ns3Edu's industry-leading CCIE (SPCOR 350-501) Training! 🌟 Dive deep into advanced concepts and hands-on skills under expert guidance. 💻💡 Don't miss this opportunity to unlock your full potential and become a certified networking expert! Join us today and take the first step towards your future success! #CCIE #Networking #Training"
International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
2. DISCLAIMER WARRANTY: THIS CONTENT IS BEING PROVIDED “AS IS.” CISCO MAKES AND YOU RECEIVE NO WARRANTIES IN
CONNECTION WITH THE CONTENT PROVIDED HEREUNDER, EXPRESS, IMPLIED, STATUTORY OR IN ANY OTHER PROVISION OF
THIS CONTENT OR COMMUNICATION BETWEEN CISCO AND YOU. CISCO SPECIFICALLY DISCLAIMS ALL IMPLIED
WARRANTIES, INCLUDING WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT AND FITNESS FOR A PARTICULAR
PURPOSE, OR ARISING FROM A COURSE OF DEALING, USAGE OR TRADE PRACTICE. This learning product may contain early release
content, and while Cisco believes it to be accurate, it falls subject to the disclaimer above.
3. Table of Contents
Course Introduction 1
Overview 1
Learner Skills and Knowledge 2
Course Goal and Objectives 3
Course Flow 4
Additional References 5
Cisco Glossary of Terms 5
Your Training Curriculum 6
MPLS Concepts 1-1
Overview 1-1
Module Objectives 1-1
Introducing Basic MPLS Concepts 1-3
Overview 1-3
Objectives 1-3
What Are the Foundations of Traditional IP Routing? 1-4
Example: Traditional IP Routing 1-5
Basic MPLS Features 1-6
Benefits of MPLS 1-7
What Are the MPLS Architecture Components? 1-8
MPLS Control Plane 1-8
MPLS Data Plane 1-9
MPLS LSRs 1-10
Example: LSR Architecture 1-12
Example: Basic MPLS 1-14
Summary 1-15
Introducing MPLS Labels and Label Stacks 1-17
Overview 1-17
Objectives 1-17
What Are MPLS Labels? 1-18
FEC and MPLS Forwarding 1-19
What Is the MPLS Label Format? 1-20
Where Are MPLS Labels Inserted? 1-21
Example: MPLS Label Insertion—Frame-Mode MPLS 1-22
What Is an MPLS Label Stack? 1-23
Example: MPLS Label Stack 1-24
Example: MPLS Label Stack Format 1-25
What Are MPLS Label Operations? 1-26
Example: MPLS Label Operations—Frame-Mode MPLS 1-27
Summary 1-28
Identifying MPLS Applications 1-29
Overview 1-29
Objectives 1-29
Which Applications Are Used with MPLS? 1-30
What Is MPLS Unicast IP Routing? 1-31
What Is MPLS Multicast IP Routing? 1-32
What Are MPLS VPNs? 1-33
What Is MPLS TE? 1-35
What Is MPLS QoS? 1-36
What Is AToM? 1-37
AToM Examples 1-38
What Are the Interactions Between MPLS Applications? 1-39
Summary 1-40
Module Summary 1-41
References 1-41
5. 2006 Cisco Systems, Inc. Implementing Cisco MPLS (MPLS) v2.2 iii
Introducing Convergence in Frame-Mode MPLS 2-49
Overview 2-49
Objectives 2-49
What Is the MPLS Steady-State Operation? 2-50
What Happens in a Link Failure? 2-51
Example: Link Failure Actions 2-51
What Is the Routing Protocol Convergence After a Link Failure? 2-52
Example: Routing Protocol Convergence 2-52
What Is the MPLS Convergence After a Link Failure? 2-53
What Actions Occur in Link Recovery? 2-55
Example: Link Recovery Actions 2-55
Summary 2-58
Introducing MPLS Label Allocation, Distribution, and Retention Modes 2-59
Overview 2-59
Objectives 2-59
Label Distribution Parameters 2-60
Distributing Labels 2-61
Example: Unsolicited Downstream 2-61
Allocating Labels 2-62
Retaining Labels 2-63
Example: Liberal Retention Mode 2-63
Summary 2-64
Module Summary 2-65
References 2-65
Module Self-Check 2-66
Module Self-Check Answer Key 2-71
Frame-Mode MPLS Implementation on Cisco IOS Platforms 3-1
Overview 3-1
Module Objectives 3-1
Introducing CEF Switching 3-3
Overview 3-3
Objectives 3-3
What Are Cisco IOS Platform-Switching Mechanisms? 3-4
Using Standard IP Switching 3-5
Example: Standard IP Switching 3-5
What Is the CEF Switching Architecture? 3-6
Configuring IP CEF 3-7
ip cef 3-7
Syntax Description 3-7
ip route-cache cef 3-8
Syntax Description 3-8
Defaults 3-8
Monitoring IP CEF 3-9
show ip cef 3-9
Summary 3-11
Configuring Frame-Mode MPLS on Cisco IOS Platforms 3-13
Overview 3-13
Objectives 3-13
What Are MPLS Configuration Tasks? 3-14
Configuring the MPLS ID on a Router 3-15
mpls ldp router-id 3-15
Configuring MPLS on a Frame-Mode Interface 3-16
mpls ip 3-16
mpls label protocol [tdp | ldp | both] 3-17
7. 2006 Cisco Systems, Inc. Implementing Cisco MPLS (MPLS) v2.2 v
MPLS VPN Technology 4-1
Overview 4-1
Module Objectives 4-1
Introducing VPNs 4-3
Overview 4-3
Objectives 4-3
Traditional Router-Based Network Connectivity 4-4
Advantages of VPNs 4-5
Example: VPNs 4-5
VPN Terminology 4-6
What Are the VPN Implementation Models? 4-8
What Are Overlay VPN Technologies? 4-9
What Are Peer-to-Peer VPN Technologies? 4-15
Example: Controlled Route Distribution 4-17
What Are the Benefits of VPNs? 4-18
What Are the Drawbacks of VPNs? 4-19
Summary 4-20
Categorizing VPNs 4-21
Overview 4-21
Objectives 4-21
What Are the Business Categories for VPNs? 4-22
What Are Extranet VPNs? 4-23
Example: Overlay VPN—Extranet VPNs 4-23
Example: Peer-to-Peer VPN Extranet VPNs 4-24
What Are the Connectivity Categories for VPNs? 4-25
What Is the Central Services Extranet? 4-26
Example: Central Services Extranet 4-26
What Is a Managed Network Implementation? 4-27
Example: Hybrid Implementation 4-28
Summary 4-29
Introducing MPLS VPN Architecture 4-31
Overview 4-31
Objectives 4-31
What Are the Drawbacks of Traditional Peer-to-Peer VPNs? 4-32
What Is the MPLS VPN Architecture? 4-33
What Is the Architecture of a PE Router in an MPLS VPN? 4-35
What Are the Methods of Propagating Routing Information Across the P-Network? 4-36
What Are RDs? 4-41
Is the RD Enough? 4-45
Example: VoIP Service Sample 4-45
Example: Connectivity Requirements 4-46
What Are RTs? 4-47
How Have Complex VPNs Redefined the Meaning of VPNs? 4-50
What Is the Impact of Complex VPN Topologies on Virtual Routing Tables? 4-51
Example: Impact of Complex VPN Topologies on Virtual Routing Tables 4-52
Summary 4-53
11. 2006 Cisco Systems, Inc. Implementing Cisco MPLS (MPLS) v2.2 ix
Configuring BGP as the Routing Protocol Between PE and CE Routers 5-127
Overview 5-127
Objectives 5-127
Configuring a Per-VRF BGP Routing Context 5-128
address-family ipv4 5-129
Defaults 5-129
Command Modes 5-129
Example: Configuring per-VRF BGP Routing Context 5-130
What Are the Reasons for Limiting the Number of Routes in a VRF? 5-131
Limiting the Number of Prefixes Received from a BGP Neighbor 5-132
neighbor maximum-prefix 5-132
Defaults 5-133
Limiting the Total Number of VRF Routes 5-134
maximum routes 5-135
Defaults 5-135
Example: Limiting the Total Number of VRF Routes 5-136
Identifying AS-Override Issues 5-137
neighbor as-override 5-140
Defaults 5-140
Example: AS-Override 5-141
Example: AS-Path Prepending 5-142
Identifying Allowas-in Issues 5-143
Example: Using Allowas-in to Support Customer Site Linking Two VPNs 5-146
neighbor allowas-in 5-147
Defaults 5-147
Implementing SOO for Loop Prevention 5-148
set extcommunity 5-150
Defaults 5-151
neighbor route-map 5-151
ip vrf sitemap 5-152
Defaults 5-152
Summary 5-154
Troubleshooting MPLS VPNs 5-155
Overview 5-155
Objectives 5-155
Identifying Preliminary Steps in MPLS VPN Troubleshooting 5-156
Verifying the Routing Information Flow 5-157
Validating CE-to-PE Routing Information Flow 5-158
Validating PE-to-PE Routing Information Flow 5-159
Validating PE-to-CE Routing Information Flow 5-164
Identifying the Issues When Verifying the Data Flow 5-165
Validating CEF Status 5-166
show cef interface 5-167
Usage Guidelines 5-167
Validating the End-to-End LSP 5-170
Validating the LFIB Status 5-171
Summary 5-172
Module Summary 5-173
References 5-174
Module Self-Check 5-175
Module Self-Check Answer Key 5-184
Complex MPLS VPNs 6-1
Overview 6-1
Module Objectives 6-1
13. 2006 Cisco Systems, Inc. Implementing Cisco MPLS (MPLS) v2.2 xi
Internet Access and MPLS VPNs 7-1
Overview 7-1
Module Objectives 7-1
Introducing Internet Access with MPLS VPNs 7-3
Overview 7-3
Objectives 7-3
Customer Internet Connectivity Scenarios 7-4
Classical Internet Access 7-4
Multisite Internet Access 7-5
Wholesale Internet Access 7-6
Internet Design Models for Service Providers 7-7
Major Design Models 7-8
Internet Access Through Global Routing 7-9
Internet Access as a Separate VPN 7-10
Disadvantages of Providing Internet Access Through Route Leaking 7-11
Summary 7-13
Implementing Separate Internet Access and VPN Services 7-15
Overview 7-15
Objectives 7-15
Classical Internet Access for a VPN Customer 7-16
Using Separate Subinterfaces 7-17
Example: Internet Access Through Static Routes 7-18
Example: Dynamic Internet Access Through a Separate Subinterface 7-19
Example: Internet Access Through a Dedicated Subinterface—Traffic Flow 7-20
Accessing the Internet from Every Customer Site 7-21
Separate Internet Access Benefits and Limitations 7-22
Summary 7-23
Implementing Internet Access as a Separate VPN 7-25
Overview 7-25
Objectives 7-25
Internet Access as a Separate VPN 7-26
Example: Configuring the Internet Gateway in a Separate VPN 7-28
Implementing Redundant Internet Access 7-29
Implementing Classical Internet Access for a VPN Customer 7-30
Implementing Internet Access from Every Customer Site 7-32
Implementing Wholesale Internet Access 7-33
Running an Internet Backbone in a VPN 7-34
Summary 7-35
Module Summary 7-36
References 7-36
Module Self-Check 7-37
Module Self-Check Answer Key 7-40
MPLS TE Overview 8-1
Overview 8-1
Module Objectives 8-1
Introducing the TE Concept 8-3
Overview 8-3
Objectives 8-3
What Is TE? 8-4
Business Drivers for TE 8-6
Congestion Avoidance and TE 8-8
TE with a Layer 2 Overlay Model 8-9
TE with a Layer 3 Model 8-12
15. 2006 Cisco Systems, Inc. Implementing Cisco MPLS (MPLS) v2.2 xiii
Monitoring MPLS TE 8-66
show mpls traffic-eng autoroute 8-66
show ip cef network 8-68
show ip cef vrf vrf-name network 8-69
Summary 8-70
References 8-70
Module Summary 8-71
References 8-71
Module Self-Check 8-72
Answer Key 8-75
16. MPLS
Course Introduction
Overview
Service providers (and enterprises acting as service providers) are faced with many challenges
in terms of customer demand, including an ongoing need for value-added services.
Conventional IP packet forwarding has several limitations, and more and more service
providers realize that something else is needed. Not only must service providers be concerned
with protecting their existing infrastructure, but they must also find ways to generate new
services that are not currently supportable using existing technologies.
Multiprotocol Label Switching (MPLS) is a high-performance method for forwarding packets
through a network. MPLS enables routers at the edge of a network to apply simple labels to
packets. This practice allows the edge devices—ATM switches or existing routers in the center
of the service provider core—to switch packets according to labels, with minimal lookup
overhead. MPLS integrates the performance and traffic-management capabilities of data link
Layer 2 with the scalability and flexibility of network Layer 3 routing. When used in
conjunction with other standard technologies, MPLS allows service providers the ability to
support value-added features that are critical for their networks.
Implementing Cisco MPLS (MPLS) v2.2 is recommended training for individuals seeking
certification as a Cisco CCIP®
. The focus of this course is on MPLS technology issues as those
issues apply to service providers and on how to configure new features and functions in an
existing routed environment.
22. Module 1
MPLS Concepts
Overview
This module explains the features of Multiprotocol Label Switching (MPLS) compared with
those of traditional hop-by-hop IP routing. MPLS concepts and terminology, along with MPLS
label format and label switch router (LSR) architecture and operations, are explained in this
module.
Module Objectives
Upon completing this module, you will be able to describe the features of MPLS. This ability
includes being able to meet these objectives:
Describe the basic MPLS concepts
Describe the structure and function of MPLS labels and MPLS label stacks
Describe the different MPLS applications in which you can use MPLS
24. Lesson 1
Introducing Basic MPLS
Concepts
Overview
This lesson discusses the basic concepts and architecture of Multiprotocol Label Switching
(MPLS). The lesson provides information about MPLS components and labels. This lesson lays
the foundation for subsequent lessons that cover key areas, such as MPLS implementations and
Virtual Private Networks (VPNs).
It is important to have a clear understanding of the role of MPLS and the makeup of the devices
and components. This understanding will help you have a clear picture of how to differentiate
between the roles of certain devices and to understand how information gets transferred across
an MPLS domain.
Objectives
Upon completing this lesson, you will be able to describe the basic MPLS concepts, including
some advantages as compared to traditional IP routing. This ability includes being able to meet
these objectives:
Describe the foundations of traditional IP routing
Describe the basic features of MPLS
Describe the benefits of MPLS
Describe the main components of the MPLS architecture
Describe the function of the different types of LSRs
38. Lesson 2
Introducing MPLS Labels and
Label Stacks
Overview
This lesson explains the four fields that make up a Multiprotocol Label Switching (MPLS)
label. This lesson also explains how label stacking is used and how labels are forwarded in
frame-mode environments.
To fully understand MPLS, it is necessary to have a clear understanding of the format of an
MPLS label, and the definition for each field in that label. You also need to know exactly how
information is passed from node to node in the network.
Objectives
Upon completing this lesson, you will be able to describe MPLS labels and MPLS label stacks,
including the format of the MPLS label and also when and why a label stack is created. This
ability includes being able to meet these objectives:
Describe the features of MPLS labels
Describe the format and fields of an MPLS label
Describe where MPLS labels are inserted in an IP packet
Describe the features of an MPLS label stack
Describe MPLS label operations
50. Lesson 3
Identifying MPLS Applications
Overview
This lesson describes some of the different types of applications with which you can use
Multiprotocol Label Switching (MPLS). These applications are discussed at a high level.
Interaction among multiple applications is also discussed because there are various methods for
exchanging labels. Regardless of the differences in the control plane, all of the applications use
a single label-forwarding engine in the data plane.
Objectives
Upon completing this lesson, you will be able to describe the different MPLS applications with
which you can use MPLS. This ability includes being able to meet these objectives:
Describe the various applications that are used with MPLS
Describe the features of MPLS unicast IP routing
Describe the features of MPLS multicast IP routing
Describe MPLS use in VPNs
Describe MPLS use in TE environments
Describe MPLS use in QoS environments
Describe AToM
Identify the interactions that occur between various MPLS applications
68. Module 2
Label Assignment and
Distribution
Overview
This module describes the assignment and distribution of labels in a Multiprotocol Label
Switching (MPLS) network, including neighbor discovery and session establishment
procedures. Label distribution, control, and retention modes will also be covered. This module
also covers the functions and benefits of penultimate hop popping (PHP).
Module Objectives
Upon completing this module, you will be able to describe how MPLS labels are assigned and
distributed. This ability includes being able to meet these objectives:
Describe how LDP neighbors are discovered
Describe how the LIB, FIB, and LFIB tables are populated with label information
Describe how convergence occurs in a frame-mode MPLS network
Describe MPLS label allocation, distribution, and retention modes
70. Lesson 1
Discovering LDP Neighbors
Overview
This lesson takes a detailed look at the Label Distribution Protocol (LDP) neighbor discovery
process via hello messages and the type of information that is exchanged. The lesson also
describes the events that occur during the negotiation phase of LDP session establishment and
concludes with the nonadjacent neighbor discovery process.
This lesson provides an understanding of how an LDP neighbor is discovered and what type of
information is sent back and forth between two neighbors. The lesson also discusses situations
in which the neighbor is not directly connected to a peer. This information will provide a
further understanding of the Multiprotocol Label Switching (MPLS) technology.
Objectives
Upon completing this lesson, you will be able to describe how LDP neighbors are discovered.
This ability includes being able to meet these objectives:
Describe how LDP sessions are established between adjacent neighbors
Describe the contents of an LDP hello message
Describe negotiating label space as it applies to LDP session establishment
Describe how LDP neighbors are discovered
Describe the process of LDP session negotiation between LDP neighbors
Describe how LDP sessions are established between nonadjacent neighbors
80. Lesson 2
Introducing Typical Label
Distribution in Frame-Mode
MPLS
Overview
This lesson discusses how label allocation and distribution function in a frame-mode network.
Also covered are penultimate hop popping (PHP) and how the Multiprotocol Label Switching
(MPLS) data structures are built. This lesson is essential to understanding the basic
fundamentals of how information gets distributed and placed into the appropriate tables for
both labeled and unlabeled packet usage.
Objectives
Upon completing this lesson, you will be able to describe how the Label Information Base
(LIB), Forwarding Information Base (FIB), and label forwarding information base (LFIB)
tables are populated with label information. This ability includes being able to meet these
objectives:
Describe how labels are propagated across a network
Describe the function of LSPs
Describe the function of PHP
Describe the impact that IP aggregation has on LSPs
Describe how labels are allocated in a frame-mode MPLS network
Describe how MPLS labels are distributed and advertised in a frame-mode network
Describe how the LFIB table is populated in an MPLS network
Describe how IP packets cross an MPLS network
Describe how frame-mode loops are detected
Describe the approaches for assigning labels to networks