SlideShare a Scribd company logo
1 of 31
By
Jagtar Singh Dhaliwal
 RCS Global Limited is an emerging in software
business solution & IT infrastructure. With the motto
of “Provide Quality Solution at the Right Price at the
Right time”.
 The company is redefining the concepts of IT
services and consulting.
 RCS Global is the sister concern of ‘RAMA Group’
founded in 1992.
 Product Realization - Excellent team work & services.
 Business Process Consulting – Total satisfaction of client.
 IT Implementation – Focus on core business.
 Database Design – Store huge DB i.e. secure & robust.
 Business Intelligent – Expertise Troubleshoot.
 Offshore Development Centre – preparing efficient &
. reliable team.
 MEDI-SUITE
 EDU-SUITE
 SAP
 .NET
 RAMCO
 Straight Cable- Switch to router
Switch to PC or server
Hub to PC or server
 Cross Cable- Switch to switch
Switch to hub
Hub to hub
Router to router
PC to PC
Router to PC
 IP is an address of a Computer on a network.
 task of delivering datagrams from the source host to the destination host
solely based on the addresses.
 Two IP version-IPv4 and IPv6
 IPv4(Internet Protocol version 4)for 32 bits
 IPv6(Internet Protocol version6)for 128 bits
 Type of IP Address
 Static IP Address (Automatically assign)
 Dynamic IP Address (Manually assign)
 There are five classes available in IP range
 Class A- 1.0.0.1 to 126.255.255.254
 Class B- 128.1.0.1 to 191.255.255.254
 Class C- 192.1.0.1 to 223.255.255.254
 Class D- 224.1.0.1 to 239.255.255.254
 Class E- 240.1.0.1 to 254.255.255.254
Range 127.0.0.1 is reserved for loopback
 Class A- assign large number of hosts
 Class B- assign large to medium network
 Class C- used in small LAN configuration
 Class D- reserved for multicasting purposes
 Class E- for research and developing centre
 With the rapid growth of the internet & the ever-
increasing demand for new addresses, the standard
address class structure has been expanded by
borrowing bits from the Host portion to allow for
more Networks.
 There are default standard subnet masks for Class A,
B and C addresses:
 The PING (Packet Internet Groper) command
verifies OSI Layer 3 (Network Layer) connectivity.
 The subnet mask is the same for all users on a
specific network.
 Internet routing devices traditionally have been called
gateways
A network gateway is an internetworking system capable of joining
together two networks that use different base protocols.
 A choke point of control and monitoring .
 Interconnects networks with differing trust.
 Imposes restrictions on network services.
 only authorized traffic is allowed
 Improve network security & reduce risks to hosts
Characterized by protocol level it controls in
 Packet filtering (filter incoming & outgoing data)
 Circuit gateways (large network filter)
 Application gateways (Need separate proxies for each service)
 Combination of above is dynamic packet filter
 Internet communication is a accomplished by exchange
of individual ‘packets’ of data.
Each packet is transmitted by its source machine
toward its destination machine.
Connection is actually comprised
Of individual packets travelling
b/w two machine.
If ‘agree’ it means connect or it will
be resend back to the machine.
 Firewall cannot prevent Virus and Trojans
from the accessing the internet.
 Mostly virus and trojan are received via e-mail
direct downloading ,etc
 Firewall not really protect the system from hackers
(or any ultra surf)
 Hard to upgrade
 Take up physical space
 Multi Protocol Label Switching is arranged between
Layer 2 and Layer 3
 Versatile solution:-speed ,QOS ,traffic management
Security management.
 Mechanisms to manage traffic flows of various
granularities (Flow Management)
 Is independent of Layer-2 and Layer-3 protocols
 Maps IP-addresses to fixed length labels
 Supports ATM, Frame-Relay and Ethernet
• Label
• Label Edge Router (LER)
• Forwarding Equivalence Router (FER)
• Label Switching Router (LSR)
• Label Distribution Protocol (LDP)
• Short fixed length entity
 20-bits label value
 Each label head contain four fields
Label Format
• Resides at the edge of an MPLS network and assigns and
removes the labels from the packets.
• Support multiple ports connected to dissimilar networks (such as
frame relay, ATM, and Ethernet).
• Is a high speed router in the core on an MPLS network.
• ATM switches can be used as LSRs without changing their
hardware. Label switching is equivalent to VP/VC switching.
• An application layer protocol for the distribution of label
binding information to LSRs.
• It is used to map FECs to labels, which, in turn, create LSPs.
• LDP sessions are established between LDP peers in the
MPLS network (not necessarily adjacent).
• In MPLS, traffic engineering is inherently provided using explicitly
routed paths.
• The LSPs are created independently, specifying different paths that
are based on user-defined policies. However, this may require
extensive operator intervention.
• RSVP-TE and CR-LDP are two possible approaches to supply
dynamic traffic engineering and QoS in MPLS.
• Improves packet-forwarding performance in the network
• Supports QoS and CoS for service differentiation
• Supports network scalability
• Integrates IP and ATM in the network
• Builds interoperable networks
 Unknown knowledge of the technology
 Miscommunication of networks still occur
 Near replacement of MPLS technology has to be put
in place of old technology
 Hardware problems
 Better security needs to be implemented so hackers
cannot get into technology
Jagtar Singh Dhaliwal
Roll No.-08588911806
Jagtar.singh@fiib.edu.com

More Related Content

What's hot (20)

Multiprotocol label switching
Multiprotocol label switchingMultiprotocol label switching
Multiprotocol label switching
 
SEGMENT Routing
SEGMENT RoutingSEGMENT Routing
SEGMENT Routing
 
Segment Routing
Segment RoutingSegment Routing
Segment Routing
 
Waris l2vpn-tutorial
Waris l2vpn-tutorialWaris l2vpn-tutorial
Waris l2vpn-tutorial
 
MPLS L3 VPN Deployment
MPLS L3 VPN DeploymentMPLS L3 VPN Deployment
MPLS L3 VPN Deployment
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
EVPN Introduction
EVPN IntroductionEVPN Introduction
EVPN Introduction
 
How BGP Works
How BGP WorksHow BGP Works
How BGP Works
 
Ether channel fundamentals
Ether channel fundamentalsEther channel fundamentals
Ether channel fundamentals
 
IP Routing Tutorial
IP Routing TutorialIP Routing Tutorial
IP Routing Tutorial
 
Multiprotocol label switching (mpls) - Networkshop44
Multiprotocol label switching (mpls)  - Networkshop44Multiprotocol label switching (mpls)  - Networkshop44
Multiprotocol label switching (mpls) - Networkshop44
 
MPLS Presentation
MPLS PresentationMPLS Presentation
MPLS Presentation
 
Implementing cisco mpls
Implementing cisco mplsImplementing cisco mpls
Implementing cisco mpls
 
Mpls Services
Mpls ServicesMpls Services
Mpls Services
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
IPV6 ADDRESS
IPV6 ADDRESSIPV6 ADDRESS
IPV6 ADDRESS
 
Routing Protocols
Routing ProtocolsRouting Protocols
Routing Protocols
 
IS-IS Protocol Introduction
IS-IS Protocol IntroductionIS-IS Protocol Introduction
IS-IS Protocol Introduction
 
Introduction to OpenFlow
Introduction to OpenFlowIntroduction to OpenFlow
Introduction to OpenFlow
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information Protocol
 

Viewers also liked

NAT (network address translation) & PAT (port address translation)
NAT (network address translation) & PAT (port address translation)NAT (network address translation) & PAT (port address translation)
NAT (network address translation) & PAT (port address translation)Netwax Lab
 
FACE RECOGNITION USING NEURAL NETWORK
FACE RECOGNITION USING NEURAL NETWORKFACE RECOGNITION USING NEURAL NETWORK
FACE RECOGNITION USING NEURAL NETWORKcodebangla
 
Face recognization using artificial nerual network
Face recognization using artificial nerual networkFace recognization using artificial nerual network
Face recognization using artificial nerual networkDharmesh Tank
 
SPEECH RECOGNITION USING NEURAL NETWORK
SPEECH RECOGNITION USING NEURAL NETWORK SPEECH RECOGNITION USING NEURAL NETWORK
SPEECH RECOGNITION USING NEURAL NETWORK Kamonasish Hore
 
Face recognition using artificial neural network
Face recognition using artificial neural networkFace recognition using artificial neural network
Face recognition using artificial neural networkSumeet Kakani
 
Multi-Protocol Label Switching: Basics and Applications
Multi-Protocol Label Switching: Basics and ApplicationsMulti-Protocol Label Switching: Basics and Applications
Multi-Protocol Label Switching: Basics and ApplicationsVishal Sharma, Ph.D.
 
Face recognition using neural network
Face recognition using neural networkFace recognition using neural network
Face recognition using neural networkIndira Nayak
 

Viewers also liked (11)

MPLS
MPLSMPLS
MPLS
 
Nat pat
Nat patNat pat
Nat pat
 
NAT (network address translation) & PAT (port address translation)
NAT (network address translation) & PAT (port address translation)NAT (network address translation) & PAT (port address translation)
NAT (network address translation) & PAT (port address translation)
 
FACE RECOGNITION USING NEURAL NETWORK
FACE RECOGNITION USING NEURAL NETWORKFACE RECOGNITION USING NEURAL NETWORK
FACE RECOGNITION USING NEURAL NETWORK
 
Face recognization using artificial nerual network
Face recognization using artificial nerual networkFace recognization using artificial nerual network
Face recognization using artificial nerual network
 
Nat
Nat Nat
Nat
 
SPEECH RECOGNITION USING NEURAL NETWORK
SPEECH RECOGNITION USING NEURAL NETWORK SPEECH RECOGNITION USING NEURAL NETWORK
SPEECH RECOGNITION USING NEURAL NETWORK
 
What is Network Address Translation (NAT)
What is Network Address Translation (NAT)What is Network Address Translation (NAT)
What is Network Address Translation (NAT)
 
Face recognition using artificial neural network
Face recognition using artificial neural networkFace recognition using artificial neural network
Face recognition using artificial neural network
 
Multi-Protocol Label Switching: Basics and Applications
Multi-Protocol Label Switching: Basics and ApplicationsMulti-Protocol Label Switching: Basics and Applications
Multi-Protocol Label Switching: Basics and Applications
 
Face recognition using neural network
Face recognition using neural networkFace recognition using neural network
Face recognition using neural network
 

Similar to MPLS ppt

Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesVamsi Krishna Kalavala
 
CCN CEP.pptx
CCN CEP.pptxCCN CEP.pptx
CCN CEP.pptxNOOR69810
 
Network Built For Local Area Networks Essay
Network Built For Local Area Networks EssayNetwork Built For Local Area Networks Essay
Network Built For Local Area Networks EssayKatyana Londono
 
Data center & wireless lan
Data center & wireless lanData center & wireless lan
Data center & wireless lanjency j
 
Network architecture - part-I
Network architecture - part-INetwork architecture - part-I
Network architecture - part-Icsk selva
 
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docxChapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docxbartholomeocoombs
 
important network terminologies
important network terminologiesimportant network terminologies
important network terminologiesevelyn
 
Glossary of introduction to networks
Glossary of introduction to networksGlossary of introduction to networks
Glossary of introduction to networksevelyn
 
UNIT 7-UNDERSTANDING LARGER NETWORKS.pptx
UNIT 7-UNDERSTANDING LARGER NETWORKS.pptxUNIT 7-UNDERSTANDING LARGER NETWORKS.pptx
UNIT 7-UNDERSTANDING LARGER NETWORKS.pptxLeahRachael
 
Nwk assignment body copy
Nwk assignment body   copyNwk assignment body   copy
Nwk assignment body copyTonny Michael
 

Similar to MPLS ppt (20)

CCNA 1
CCNA 1CCNA 1
CCNA 1
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notes
 
Essay On Ethernet
Essay On EthernetEssay On Ethernet
Essay On Ethernet
 
CCN CEP.pptx
CCN CEP.pptxCCN CEP.pptx
CCN CEP.pptx
 
Network Built For Local Area Networks Essay
Network Built For Local Area Networks EssayNetwork Built For Local Area Networks Essay
Network Built For Local Area Networks Essay
 
Document
DocumentDocument
Document
 
Data center & wireless lan
Data center & wireless lanData center & wireless lan
Data center & wireless lan
 
Ccna report
Ccna reportCcna report
Ccna report
 
Ccna1 presentation
Ccna1 presentationCcna1 presentation
Ccna1 presentation
 
C C N A Day5
C C N A  Day5C C N A  Day5
C C N A Day5
 
Link_NwkingforDevOps
Link_NwkingforDevOpsLink_NwkingforDevOps
Link_NwkingforDevOps
 
nv.ppt
nv.pptnv.ppt
nv.ppt
 
Network architecture - part-I
Network architecture - part-INetwork architecture - part-I
Network architecture - part-I
 
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docxChapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
 
Mpls vpn1
Mpls vpn1Mpls vpn1
Mpls vpn1
 
important network terminologies
important network terminologiesimportant network terminologies
important network terminologies
 
Glossary of introduction to networks
Glossary of introduction to networksGlossary of introduction to networks
Glossary of introduction to networks
 
CCNA ppt
CCNA pptCCNA ppt
CCNA ppt
 
UNIT 7-UNDERSTANDING LARGER NETWORKS.pptx
UNIT 7-UNDERSTANDING LARGER NETWORKS.pptxUNIT 7-UNDERSTANDING LARGER NETWORKS.pptx
UNIT 7-UNDERSTANDING LARGER NETWORKS.pptx
 
Nwk assignment body copy
Nwk assignment body   copyNwk assignment body   copy
Nwk assignment body copy
 

More from Jagtar Dhaliwal

More from Jagtar Dhaliwal (8)

FIIB-ITP-2015-Jagtar_Singh
FIIB-ITP-2015-Jagtar_SinghFIIB-ITP-2015-Jagtar_Singh
FIIB-ITP-2015-Jagtar_Singh
 
SCM Big Bazaar ppt
SCM Big Bazaar pptSCM Big Bazaar ppt
SCM Big Bazaar ppt
 
MARKETING NPD
MARKETING NPDMARKETING NPD
MARKETING NPD
 
Fevicol Main Group 3 (1)
Fevicol Main Group 3 (1)Fevicol Main Group 3 (1)
Fevicol Main Group 3 (1)
 
OM PPT final
OM PPT finalOM PPT final
OM PPT final
 
HBO-Movie Analysis(Shawshank Redemotion)
HBO-Movie Analysis(Shawshank Redemotion)HBO-Movie Analysis(Shawshank Redemotion)
HBO-Movie Analysis(Shawshank Redemotion)
 
Maruti case_LAB_Group 4 final
Maruti case_LAB_Group 4 finalMaruti case_LAB_Group 4 final
Maruti case_LAB_Group 4 final
 
BRM
BRMBRM
BRM
 

MPLS ppt

  • 2.  RCS Global Limited is an emerging in software business solution & IT infrastructure. With the motto of “Provide Quality Solution at the Right Price at the Right time”.  The company is redefining the concepts of IT services and consulting.  RCS Global is the sister concern of ‘RAMA Group’ founded in 1992.
  • 3.  Product Realization - Excellent team work & services.  Business Process Consulting – Total satisfaction of client.  IT Implementation – Focus on core business.  Database Design – Store huge DB i.e. secure & robust.  Business Intelligent – Expertise Troubleshoot.  Offshore Development Centre – preparing efficient & . reliable team.
  • 4.  MEDI-SUITE  EDU-SUITE  SAP  .NET  RAMCO
  • 5.
  • 6.  Straight Cable- Switch to router Switch to PC or server Hub to PC or server  Cross Cable- Switch to switch Switch to hub Hub to hub Router to router PC to PC Router to PC
  • 7.  IP is an address of a Computer on a network.  task of delivering datagrams from the source host to the destination host solely based on the addresses.  Two IP version-IPv4 and IPv6  IPv4(Internet Protocol version 4)for 32 bits  IPv6(Internet Protocol version6)for 128 bits  Type of IP Address  Static IP Address (Automatically assign)  Dynamic IP Address (Manually assign)
  • 8.  There are five classes available in IP range  Class A- 1.0.0.1 to 126.255.255.254  Class B- 128.1.0.1 to 191.255.255.254  Class C- 192.1.0.1 to 223.255.255.254  Class D- 224.1.0.1 to 239.255.255.254  Class E- 240.1.0.1 to 254.255.255.254 Range 127.0.0.1 is reserved for loopback
  • 9.  Class A- assign large number of hosts  Class B- assign large to medium network  Class C- used in small LAN configuration  Class D- reserved for multicasting purposes  Class E- for research and developing centre
  • 10.
  • 11.  With the rapid growth of the internet & the ever- increasing demand for new addresses, the standard address class structure has been expanded by borrowing bits from the Host portion to allow for more Networks.  There are default standard subnet masks for Class A, B and C addresses:
  • 12.  The PING (Packet Internet Groper) command verifies OSI Layer 3 (Network Layer) connectivity.  The subnet mask is the same for all users on a specific network.  Internet routing devices traditionally have been called gateways A network gateway is an internetworking system capable of joining together two networks that use different base protocols.
  • 13.  A choke point of control and monitoring .  Interconnects networks with differing trust.  Imposes restrictions on network services.  only authorized traffic is allowed  Improve network security & reduce risks to hosts
  • 14. Characterized by protocol level it controls in  Packet filtering (filter incoming & outgoing data)  Circuit gateways (large network filter)  Application gateways (Need separate proxies for each service)  Combination of above is dynamic packet filter
  • 15.  Internet communication is a accomplished by exchange of individual ‘packets’ of data. Each packet is transmitted by its source machine toward its destination machine. Connection is actually comprised Of individual packets travelling b/w two machine. If ‘agree’ it means connect or it will be resend back to the machine.
  • 16.
  • 17.  Firewall cannot prevent Virus and Trojans from the accessing the internet.  Mostly virus and trojan are received via e-mail direct downloading ,etc  Firewall not really protect the system from hackers (or any ultra surf)  Hard to upgrade  Take up physical space
  • 18.
  • 19.
  • 20.  Multi Protocol Label Switching is arranged between Layer 2 and Layer 3  Versatile solution:-speed ,QOS ,traffic management Security management.
  • 21.  Mechanisms to manage traffic flows of various granularities (Flow Management)  Is independent of Layer-2 and Layer-3 protocols  Maps IP-addresses to fixed length labels  Supports ATM, Frame-Relay and Ethernet
  • 22. • Label • Label Edge Router (LER) • Forwarding Equivalence Router (FER) • Label Switching Router (LSR) • Label Distribution Protocol (LDP)
  • 23. • Short fixed length entity  20-bits label value  Each label head contain four fields Label Format
  • 24. • Resides at the edge of an MPLS network and assigns and removes the labels from the packets. • Support multiple ports connected to dissimilar networks (such as frame relay, ATM, and Ethernet).
  • 25. • Is a high speed router in the core on an MPLS network. • ATM switches can be used as LSRs without changing their hardware. Label switching is equivalent to VP/VC switching.
  • 26.
  • 27. • An application layer protocol for the distribution of label binding information to LSRs. • It is used to map FECs to labels, which, in turn, create LSPs. • LDP sessions are established between LDP peers in the MPLS network (not necessarily adjacent).
  • 28. • In MPLS, traffic engineering is inherently provided using explicitly routed paths. • The LSPs are created independently, specifying different paths that are based on user-defined policies. However, this may require extensive operator intervention. • RSVP-TE and CR-LDP are two possible approaches to supply dynamic traffic engineering and QoS in MPLS.
  • 29. • Improves packet-forwarding performance in the network • Supports QoS and CoS for service differentiation • Supports network scalability • Integrates IP and ATM in the network • Builds interoperable networks
  • 30.  Unknown knowledge of the technology  Miscommunication of networks still occur  Near replacement of MPLS technology has to be put in place of old technology  Hardware problems  Better security needs to be implemented so hackers cannot get into technology
  • 31. Jagtar Singh Dhaliwal Roll No.-08588911806 Jagtar.singh@fiib.edu.com