MPLS-TE memungkinkan pengaturan aliran lalu lintas jaringan untuk memaksimalkan sumber daya dan kinerja jaringan dengan memilih rute berdasarkan beban lalu lintas, kondisi jaringan, dan persyaratan pengguna. MPLS-TE menggunakan protokol seperti IS-IS dan OSPF untuk berbagi informasi topologi, CSPF untuk perhitungan rute, dan RSVP-TE atau CR-LDP untuk pengaturan LSP secara dinamis
CISCO Virtual Private LAN Service (VPLS) Technical Deployment OverviewAmeen Wayok
This document discusses Virtual Private LAN Service (VPLS) and provides an overview of VPLS technical concepts. VPLS defines an architecture that delivers Ethernet multipoint services over an MPLS network by emulating an Ethernet bridge. Key components of VPLS include provider edge devices, pseudowires to connect customer sites, and virtual switch instances to segment customer traffic. VPLS supports both direct attachment and hierarchical architectures. Loop prevention is achieved through a full mesh of pseudowires between provider edges and split horizon forwarding in the MPLS core.
The document discusses Layer 2 VPN over MPLS, including concepts of Virtual Private Wire Service (VPWS) and Virtual Private LAN Service (VPLS). It covers characteristics of Layer 3 and Layer 2 VPNs and concepts of L2 VPN signaling using protocols like LDP and BGP. The document also provides examples of encapsulation and data flow for Ethernet over MPLS (EoMPLS) and Frame Relay over MPLS (FRoMPLS) L2 VPN services.
MPLS L3 VPN allows companies to offer Layer 3 VPN services with advantages like scalability, security, and support for duplicate IP addresses and different network topologies. The key components that enable this are VRF tables on PE routers that separate routing information for each customer to avoid duplicate IP issues, and MP-BGP which customizes VPN routing information using a Route Distinguisher, VPN label, and Route Target to support different VPN topologies. MPLS L3 VPN provides services like multi-homed sites for redundancy, hub-and-spoke networks, internet access with security, and extranets for inter-company communication.
This document summarizes port channels, virtual port channels (vPC), and multi-chassis etherchannel (MCEC) technologies. It discusses the basic design of vPC including components, initialization stages, best practices, and failure scenarios. Key points covered include vPC domains, roles, peer links, consistency checks, and configuration examples on Nexus 5000/7000/FEX platforms. Enhanced vPC (EvPC) and interactions with first hop redundancy protocols are also summarized.
The document is a tutorial on L2VPN (Layer 2 Virtual Private Networks) that provides an agenda covering introductions, concepts, transports, services, pseudowire stitching, QoS, and demonstrations. It defines L2VPN as providing an end-to-end layer 2 connection across a service provider's MPLS or IP core, allowing legacy services like Frame Relay and ATM to be migrated to an MPLS/IP infrastructure. It also describes the need for L2VPN, models like VPLS and VPWS, basic building blocks of pseudowires, and control plane requirements.
this pdf contain simple method to install one of important MPLS service MPLS L3VPN and explain how mpls distribute labels
use simple routing protocol with customer (static route) to initiate L3VPN
EVPN is a network virtualization technology that allows Ethernet services to be delivered across MPLS or IP networks. It uses BGP for the control plane to distribute MAC and IP addresses and can support both single-active and all-active multi-homing topologies. EVPN provides flexibility in service delivery and has been widely adopted by major service providers and cloud providers for a variety of use cases including data center interconnect and virtual machine mobility. Automation of EVPN configuration can simplify provisioning and management through the use of tools like NetBox, Python scripts, Ansible, and workflow managers.
CISCO Virtual Private LAN Service (VPLS) Technical Deployment OverviewAmeen Wayok
This document discusses Virtual Private LAN Service (VPLS) and provides an overview of VPLS technical concepts. VPLS defines an architecture that delivers Ethernet multipoint services over an MPLS network by emulating an Ethernet bridge. Key components of VPLS include provider edge devices, pseudowires to connect customer sites, and virtual switch instances to segment customer traffic. VPLS supports both direct attachment and hierarchical architectures. Loop prevention is achieved through a full mesh of pseudowires between provider edges and split horizon forwarding in the MPLS core.
The document discusses Layer 2 VPN over MPLS, including concepts of Virtual Private Wire Service (VPWS) and Virtual Private LAN Service (VPLS). It covers characteristics of Layer 3 and Layer 2 VPNs and concepts of L2 VPN signaling using protocols like LDP and BGP. The document also provides examples of encapsulation and data flow for Ethernet over MPLS (EoMPLS) and Frame Relay over MPLS (FRoMPLS) L2 VPN services.
MPLS L3 VPN allows companies to offer Layer 3 VPN services with advantages like scalability, security, and support for duplicate IP addresses and different network topologies. The key components that enable this are VRF tables on PE routers that separate routing information for each customer to avoid duplicate IP issues, and MP-BGP which customizes VPN routing information using a Route Distinguisher, VPN label, and Route Target to support different VPN topologies. MPLS L3 VPN provides services like multi-homed sites for redundancy, hub-and-spoke networks, internet access with security, and extranets for inter-company communication.
This document summarizes port channels, virtual port channels (vPC), and multi-chassis etherchannel (MCEC) technologies. It discusses the basic design of vPC including components, initialization stages, best practices, and failure scenarios. Key points covered include vPC domains, roles, peer links, consistency checks, and configuration examples on Nexus 5000/7000/FEX platforms. Enhanced vPC (EvPC) and interactions with first hop redundancy protocols are also summarized.
The document is a tutorial on L2VPN (Layer 2 Virtual Private Networks) that provides an agenda covering introductions, concepts, transports, services, pseudowire stitching, QoS, and demonstrations. It defines L2VPN as providing an end-to-end layer 2 connection across a service provider's MPLS or IP core, allowing legacy services like Frame Relay and ATM to be migrated to an MPLS/IP infrastructure. It also describes the need for L2VPN, models like VPLS and VPWS, basic building blocks of pseudowires, and control plane requirements.
this pdf contain simple method to install one of important MPLS service MPLS L3VPN and explain how mpls distribute labels
use simple routing protocol with customer (static route) to initiate L3VPN
EVPN is a network virtualization technology that allows Ethernet services to be delivered across MPLS or IP networks. It uses BGP for the control plane to distribute MAC and IP addresses and can support both single-active and all-active multi-homing topologies. EVPN provides flexibility in service delivery and has been widely adopted by major service providers and cloud providers for a variety of use cases including data center interconnect and virtual machine mobility. Automation of EVPN configuration can simplify provisioning and management through the use of tools like NetBox, Python scripts, Ansible, and workflow managers.
The document provides information about an upcoming training course on deploying MPLS L3 VPNs. It includes details about the trainers, Nurul Islam Roman and Jessica Wei, their backgrounds and areas of expertise. It also outlines the course agenda which will cover topics such as MPLS VPN models, terminology, operation, configuration examples and service deployment scenarios.
The document provides an introduction to MPLS (Multi-Protocol Label Switching) in 3 sentences:
MPLS tags network traffic with labels to allow for fast switching through the network based on the label rather than traditional lookups of IP addresses, originally intended to simplify routing but also enabling features like traffic engineering and virtual private networks. MPLS works by adding a label to layer 2 frames at the edge of the network which is then used to forward packets across the core based on pre-established label switched paths, with the labels being distributed using a label distribution protocol.
This presentation introduces Data Plane Development Kit overview and basics. It is a part of a Network Programming Series.
First, the presentation focuses on the network performance challenges on the modern systems by comparing modern CPUs with modern 10 Gbps ethernet links. Then it touches memory hierarchy and kernel bottlenecks.
The following part explains the main DPDK techniques, like polling, bursts, hugepages and multicore processing.
DPDK overview explains how is the DPDK application is being initialized and run, touches lockless queues (rte_ring), memory pools (rte_mempool), memory buffers (rte_mbuf), hashes (rte_hash), cuckoo hashing, longest prefix match library (rte_lpm), poll mode drivers (PMDs) and kernel NIC interface (KNI).
At the end, there are few DPDK performance tips.
Tags: access time, burst, cache, dpdk, driver, ethernet, hub, hugepage, ip, kernel, lcore, linux, memory, pmd, polling, rss, softswitch, switch, userspace, xeon
This document discusses OSPF packet types used for communication between routers to discover network routes, add link state entries to maintain routing information using LSA sequence numbers which can be viewed using the show IP OSPF database command, and debugged in more detail using the debug ip OSPF packets command.
This document provides an overview of MPLS (Multi-Protocol Label Switching) including its motivation, basics, components, operation, and advantages/disadvantages. MPLS was created to combine the fast packet forwarding of ATM with the flexibility of IP by using labels to direct network traffic. Key components include label edge routers that apply/remove labels, label switching routers that forward based on labels, label distribution protocols to disseminate label mappings, and label switched paths that represent forwarding equivalency classes. MPLS allows for traffic engineering, quality of service, and network scalability.
OSPF stub areas, totally stubby areas, and not-so-stubby (NSSA) areas are specialized area types that control the routing information distributed within the area. Stub areas allow only Type 1 and 2 LSAs, and the ABR will advertise a default route into the stub area. NSSAs function similarly but also allow an ASBR to advertise external routes using Type 7 LSAs, which the ABR converts to Type 5 LSAs. A totally stubby area receives no Type 3 LSAs, while a totally NSSA area also filters Type 3 LSAs and relies on a default route from the ABR.
MPLS Traffic Engineering provides mechanisms to optimize network traffic flow and efficiently utilize bandwidth. It determines paths based on additional parameters like available resources and constraints. This allows load balancing across unequal paths and routing around failed links or nodes. MPLS TE uses extensions to IGPs to distribute link attributes and tunnel information. Constrained Shortest Path First (CSPF) is used for path computation to find paths meeting constraints like bandwidth and affinities. Tunnels are set up using RSVP-TE and traffic can be forwarded down tunnels using methods like static routes, auto-routing, or policy routing. Fast Re-Route provides local repair of TE tunnels if a link or node fails to minimize traffic loss.
This document explains MPLS Layer 3 VPNs. It discusses how Layer 3 VPNs allow routing information to be shared between customer sites using protocols like OSPF and BGP across the service provider's MPLS network. It describes how Virtual Routing and Forwarding instances (VRFs), MP-BGP, Route Distinguishers (RDs), and Route Targets (RTs) work together to separate routing information for different customers and establish VPN connectivity between their sites while avoiding overlapping address spaces.
This document discusses the different packet types used in IS-IS routing protocol. There are four main packet types: Hello PDUs which discover neighbors, Link State PDUs which exchange routing information, Partial Sequence Number PDUs which request missing information, and Complete Sequence Number PDUs which synchronize link state databases. All packet types carry Type-Length-Value fields which allow for extensibility.
This document provides an introduction and overview of MPLS (Multi-Protocol Label Switching). It defines MPLS, discusses why it was developed to address limitations in IP routing, and how it works by assigning labels to packets which are then forwarded based on the label rather than long IP address lookups. Key MPLS concepts covered include label edge routers, label switch routers, label switch paths, and protocols like LDP and RSVP-TE. Applications like traffic engineering and MPLS VPNs are also mentioned.
This document provides an overview and configuration instructions for deploying Carrier Ethernet services on the Cisco ASR 9000 router. It begins with an introduction to Carrier Ethernet and the Cisco ASR 9000 platform. It then covers the configuration of Ethernet flow points (EFPs) to classify and rewrite VLAN tags. The document details various Ethernet service types including point-to-point local connect and VPWS services, as well as multipoint bridging and VPLS services. It concludes with sections on operations, administration, and maintenance (OAM) and best practices.
The document discusses various methods of configuring MPLS in a network, including:
1. Configuring LDP to automatically establish label-switched paths between routers.
2. Configuring RSVP signaling to establish an explicit LSP from Batam to Ambon with a bandwidth reservation of 500Mb.
3. Integrating LSP routes into the unicast routing table and verifying LSP establishment through traceroute.
The document discusses SDH/SONET alarms and performance monitoring. It begins with an introduction to relevant standards bodies and then covers:
- Alarm types like LOF, AIS, and RDI found in different sections of the SDH frame including the regenerator, multiplex, and path overhead areas.
- Defect naming conventions and how defects are correlated to avoid unnecessary alarms.
- Performance monitoring parameters and what different path levels in the SDH hierarchy represent.
- Examples of how circuits like DS1 and DS3 are carried by SONET through different layers.
IS-IS is an interior gateway protocol that uses link-state routing and SPF algorithms to calculate the shortest path. It supports both CLNP and IP and has three routing levels - level 1 for intra-area routing, level 2 for inter-area routing, and level 1/2 routers that connect levels 1 and 2. There are three types of IS-IS routers: level 1 that exchange intra-area topology, level 2 that exchange inter-area topology, and level 1/2 that act as border routers between levels 1 and 2.
Hot Standby Router Protocol (HSRP) is a Cisco proprietary redundancy protocol for establishing a faulttolerant default gateway, and has been described in detail in RFC 2281.
The protocol establishes a framework between network routers in order to achieve default gateway
failover if the primary gateway becomes inaccessible, in close association with a rapid-converging
routing protocol like EIGRP or OSPF. By multicasting packets, HSRP sends its hello messages to the
multicast address 224.0.0.2 (all routers) for version 1, or 224.0.0.102 for version 2, using UDP port 1985,
to other HSRP-enabled routers, defining priority between the routers.
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]APNIC
This document discusses deploying MPLS L3VPN. It begins with an overview of MPLS and VPN terminology. It then covers the MPLS reference architecture and different node types. It describes how IP/VPN technologies use separate routing tables at provider edge (PE) routers to provide independent virtual routing and forwarding (VRF) instances for each VPN customer. The control plane uses multiprotocol BGP (MP-BGP) to distribute VPN routes between PE routers using route distinguisher (RD), route target (RT), and labels. The forwarding plane uses these labels to encapsulate and transport customer IP packets across the MPLS core. The document then discusses various IP/VPN services including load sharing, hub-and-spoke
- Scaleway uses VXLAN with BGP EVPN to build an overlay fabric on their network infrastructure. This provides multi-tenancy, encapsulation of Ethernet frames over UDP, and support for both bridging and routing.
- The underlay fabric uses Clos topology with IPv4 and eBGP for high bandwidth and resilience. Edge devices run as VTEPs to connect virtual networks over the overlay.
- A virtual route reflector provides the control plane for the overlay fabric, decoupling it from the underlying hardware. This allows routing between subnets and multi-homing of hosts between VTEPs.
The document discusses Linux networking architecture and covers several key topics in 3 paragraphs or less:
It first describes the basic structure and layers of the Linux networking stack including the network device interface, network layer protocols like IP, transport layer, and sockets. It then discusses how network packets are managed in Linux through the use of socket buffers and associated functions. The document also provides an overview of the data link layer and protocols like Ethernet, PPP, and how they are implemented in Linux.
Dokumen ini membahas tentang konfigurasi jaringan layer 2 virtual private network (L2VPN) atau virtual private LAN service (VPLS) menggunakan protokol MPLS. Terdapat penjelasan singkat tentang konfigurasi OSPF, Metronet, cross connect, dan pengecekan konektivitas antar sisi seperti ping dan bandwidth. Dokumen ini juga memuat daftar tes untuk memverifikasi layanan VPLS.
MPLS adalah teknologi penyampaian paket data pada jaringan berkecepatan tinggi yang menggunakan label untuk meneruskan paket. MPLS mendukung QoS, mengintegrasikan berbagai jenis jaringan, dan membangun jaringan interoperabel. MPLS bekerja dengan menciptakan label untuk kelas kesetaraan maju, mendistribusikan label, membuat tabel label, dan meneruskan paket berdasarkan label.
The document provides information about an upcoming training course on deploying MPLS L3 VPNs. It includes details about the trainers, Nurul Islam Roman and Jessica Wei, their backgrounds and areas of expertise. It also outlines the course agenda which will cover topics such as MPLS VPN models, terminology, operation, configuration examples and service deployment scenarios.
The document provides an introduction to MPLS (Multi-Protocol Label Switching) in 3 sentences:
MPLS tags network traffic with labels to allow for fast switching through the network based on the label rather than traditional lookups of IP addresses, originally intended to simplify routing but also enabling features like traffic engineering and virtual private networks. MPLS works by adding a label to layer 2 frames at the edge of the network which is then used to forward packets across the core based on pre-established label switched paths, with the labels being distributed using a label distribution protocol.
This presentation introduces Data Plane Development Kit overview and basics. It is a part of a Network Programming Series.
First, the presentation focuses on the network performance challenges on the modern systems by comparing modern CPUs with modern 10 Gbps ethernet links. Then it touches memory hierarchy and kernel bottlenecks.
The following part explains the main DPDK techniques, like polling, bursts, hugepages and multicore processing.
DPDK overview explains how is the DPDK application is being initialized and run, touches lockless queues (rte_ring), memory pools (rte_mempool), memory buffers (rte_mbuf), hashes (rte_hash), cuckoo hashing, longest prefix match library (rte_lpm), poll mode drivers (PMDs) and kernel NIC interface (KNI).
At the end, there are few DPDK performance tips.
Tags: access time, burst, cache, dpdk, driver, ethernet, hub, hugepage, ip, kernel, lcore, linux, memory, pmd, polling, rss, softswitch, switch, userspace, xeon
This document discusses OSPF packet types used for communication between routers to discover network routes, add link state entries to maintain routing information using LSA sequence numbers which can be viewed using the show IP OSPF database command, and debugged in more detail using the debug ip OSPF packets command.
This document provides an overview of MPLS (Multi-Protocol Label Switching) including its motivation, basics, components, operation, and advantages/disadvantages. MPLS was created to combine the fast packet forwarding of ATM with the flexibility of IP by using labels to direct network traffic. Key components include label edge routers that apply/remove labels, label switching routers that forward based on labels, label distribution protocols to disseminate label mappings, and label switched paths that represent forwarding equivalency classes. MPLS allows for traffic engineering, quality of service, and network scalability.
OSPF stub areas, totally stubby areas, and not-so-stubby (NSSA) areas are specialized area types that control the routing information distributed within the area. Stub areas allow only Type 1 and 2 LSAs, and the ABR will advertise a default route into the stub area. NSSAs function similarly but also allow an ASBR to advertise external routes using Type 7 LSAs, which the ABR converts to Type 5 LSAs. A totally stubby area receives no Type 3 LSAs, while a totally NSSA area also filters Type 3 LSAs and relies on a default route from the ABR.
MPLS Traffic Engineering provides mechanisms to optimize network traffic flow and efficiently utilize bandwidth. It determines paths based on additional parameters like available resources and constraints. This allows load balancing across unequal paths and routing around failed links or nodes. MPLS TE uses extensions to IGPs to distribute link attributes and tunnel information. Constrained Shortest Path First (CSPF) is used for path computation to find paths meeting constraints like bandwidth and affinities. Tunnels are set up using RSVP-TE and traffic can be forwarded down tunnels using methods like static routes, auto-routing, or policy routing. Fast Re-Route provides local repair of TE tunnels if a link or node fails to minimize traffic loss.
This document explains MPLS Layer 3 VPNs. It discusses how Layer 3 VPNs allow routing information to be shared between customer sites using protocols like OSPF and BGP across the service provider's MPLS network. It describes how Virtual Routing and Forwarding instances (VRFs), MP-BGP, Route Distinguishers (RDs), and Route Targets (RTs) work together to separate routing information for different customers and establish VPN connectivity between their sites while avoiding overlapping address spaces.
This document discusses the different packet types used in IS-IS routing protocol. There are four main packet types: Hello PDUs which discover neighbors, Link State PDUs which exchange routing information, Partial Sequence Number PDUs which request missing information, and Complete Sequence Number PDUs which synchronize link state databases. All packet types carry Type-Length-Value fields which allow for extensibility.
This document provides an introduction and overview of MPLS (Multi-Protocol Label Switching). It defines MPLS, discusses why it was developed to address limitations in IP routing, and how it works by assigning labels to packets which are then forwarded based on the label rather than long IP address lookups. Key MPLS concepts covered include label edge routers, label switch routers, label switch paths, and protocols like LDP and RSVP-TE. Applications like traffic engineering and MPLS VPNs are also mentioned.
This document provides an overview and configuration instructions for deploying Carrier Ethernet services on the Cisco ASR 9000 router. It begins with an introduction to Carrier Ethernet and the Cisco ASR 9000 platform. It then covers the configuration of Ethernet flow points (EFPs) to classify and rewrite VLAN tags. The document details various Ethernet service types including point-to-point local connect and VPWS services, as well as multipoint bridging and VPLS services. It concludes with sections on operations, administration, and maintenance (OAM) and best practices.
The document discusses various methods of configuring MPLS in a network, including:
1. Configuring LDP to automatically establish label-switched paths between routers.
2. Configuring RSVP signaling to establish an explicit LSP from Batam to Ambon with a bandwidth reservation of 500Mb.
3. Integrating LSP routes into the unicast routing table and verifying LSP establishment through traceroute.
The document discusses SDH/SONET alarms and performance monitoring. It begins with an introduction to relevant standards bodies and then covers:
- Alarm types like LOF, AIS, and RDI found in different sections of the SDH frame including the regenerator, multiplex, and path overhead areas.
- Defect naming conventions and how defects are correlated to avoid unnecessary alarms.
- Performance monitoring parameters and what different path levels in the SDH hierarchy represent.
- Examples of how circuits like DS1 and DS3 are carried by SONET through different layers.
IS-IS is an interior gateway protocol that uses link-state routing and SPF algorithms to calculate the shortest path. It supports both CLNP and IP and has three routing levels - level 1 for intra-area routing, level 2 for inter-area routing, and level 1/2 routers that connect levels 1 and 2. There are three types of IS-IS routers: level 1 that exchange intra-area topology, level 2 that exchange inter-area topology, and level 1/2 that act as border routers between levels 1 and 2.
Hot Standby Router Protocol (HSRP) is a Cisco proprietary redundancy protocol for establishing a faulttolerant default gateway, and has been described in detail in RFC 2281.
The protocol establishes a framework between network routers in order to achieve default gateway
failover if the primary gateway becomes inaccessible, in close association with a rapid-converging
routing protocol like EIGRP or OSPF. By multicasting packets, HSRP sends its hello messages to the
multicast address 224.0.0.2 (all routers) for version 1, or 224.0.0.102 for version 2, using UDP port 1985,
to other HSRP-enabled routers, defining priority between the routers.
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]APNIC
This document discusses deploying MPLS L3VPN. It begins with an overview of MPLS and VPN terminology. It then covers the MPLS reference architecture and different node types. It describes how IP/VPN technologies use separate routing tables at provider edge (PE) routers to provide independent virtual routing and forwarding (VRF) instances for each VPN customer. The control plane uses multiprotocol BGP (MP-BGP) to distribute VPN routes between PE routers using route distinguisher (RD), route target (RT), and labels. The forwarding plane uses these labels to encapsulate and transport customer IP packets across the MPLS core. The document then discusses various IP/VPN services including load sharing, hub-and-spoke
- Scaleway uses VXLAN with BGP EVPN to build an overlay fabric on their network infrastructure. This provides multi-tenancy, encapsulation of Ethernet frames over UDP, and support for both bridging and routing.
- The underlay fabric uses Clos topology with IPv4 and eBGP for high bandwidth and resilience. Edge devices run as VTEPs to connect virtual networks over the overlay.
- A virtual route reflector provides the control plane for the overlay fabric, decoupling it from the underlying hardware. This allows routing between subnets and multi-homing of hosts between VTEPs.
The document discusses Linux networking architecture and covers several key topics in 3 paragraphs or less:
It first describes the basic structure and layers of the Linux networking stack including the network device interface, network layer protocols like IP, transport layer, and sockets. It then discusses how network packets are managed in Linux through the use of socket buffers and associated functions. The document also provides an overview of the data link layer and protocols like Ethernet, PPP, and how they are implemented in Linux.
Dokumen ini membahas tentang konfigurasi jaringan layer 2 virtual private network (L2VPN) atau virtual private LAN service (VPLS) menggunakan protokol MPLS. Terdapat penjelasan singkat tentang konfigurasi OSPF, Metronet, cross connect, dan pengecekan konektivitas antar sisi seperti ping dan bandwidth. Dokumen ini juga memuat daftar tes untuk memverifikasi layanan VPLS.
MPLS adalah teknologi penyampaian paket data pada jaringan berkecepatan tinggi yang menggunakan label untuk meneruskan paket. MPLS mendukung QoS, mengintegrasikan berbagai jenis jaringan, dan membangun jaringan interoperabel. MPLS bekerja dengan menciptakan label untuk kelas kesetaraan maju, mendistribusikan label, membuat tabel label, dan meneruskan paket berdasarkan label.
Dokumen tersebut membahas tentang berbagai jenis protokol routing dan karakteristiknya. Protokol routing membantu router bertukar informasi tentang topologi jaringan untuk membangun tabel routing. Terdapat tiga kelas protokol routing yaitu distance vector, link state, dan exterior gateway protocol. Beberapa protokol yang dijelaskan antara lain RIP, OSPF, EIGRP, IGRP, dan BGP.
Ospf (open shortest path first) belajar mengenal dunia teknologi informasiAprizal Aprizal
Teks tersebut membahas protokol OSPF (Open Shortest Path First) yang merupakan protokol routing terdistribusi berbasis link-state. OSPF menggunakan konsep flooding untuk menyebarkan perubahan topologi jaringan, designated router untuk mengkoordinasikan router di jaringan multiakses, dan pembagian jaringan besar menjadi beberapa area untuk meningkatkan skalabilitas dan efisiensi perhitungan routing.
Makalah ini membahas tentang routing dan macam-macam routing pada jaringan komputer. Secara singkat, routing adalah proses penentuan jalur terbaik untuk mengirimkan paket data dari sumber ke tujuan melalui router. Ada dua jenis routing, yaitu static routing yang menentukan jalur secara manual, dan dynamic routing yang menentukan jalur secara otomatis berdasarkan informasi dari router lain. Contoh protokol dynamic routing adalah RIP, OSPF, IGRP,
Dokumen tersebut memberikan penjelasan tentang protokol routing dinamik seperti OSPF dan BGP yang didukung oleh Mikrotik Router OS. OSPF digunakan untuk membentuk informasi routing secara otomatis di dalam autonomous system, sedangkan BGP digunakan untuk berbagi informasi routing antar autonomous system. Dokumen ini juga menjelaskan konfigurasi dasar dan fitur-fitur penting dari OSPF dan BGP seperti area, jaringan, tetangga, tabel routing, peer, dan filter
Tugas Jaringan Komputer
Kelompok 4:
Anwar Ladiku_10215077
Bondan Abiyoga W.H_10215048
Galih Seto Satri_10215071
M. Rinaldi Hasanudin_10215053
Tri Bayu Kusnadi_10215080
Dokumen tersebut merupakan laporan praktikum jaringan komputer tentang konfigurasi protokol routing Open Shortest Path First (OSPF) menggunakan Packet Tracer. Mahasiswa melakukan konfigurasi OSPF pada topologi jaringan yang terdiri dari beberapa router dan menguji konfigurasi tersebut dengan perintah show.
The document outlines various scenarios for establishing and releasing HRPD sessions between an access terminal (AT) and air interface (AN) on a CDMA network. It describes successful and unsuccessful authentication procedures when the AT originates a session, as well as call reactivation from dormancy initiated by the network or AT. It also covers connection and session release that can be initiated by the AT, AN, or PDSN.
1. Dokumen tersebut membahas tentang struktur saluran maju dan mundur pada sistem telekomunikasi CDMA2000 1xEV-DO. Terdiri dari 3 kalimat:
2. Struktur saluran maju terdiri atas saluran pilot, MAC, dan saluran trafik/kontrol yang ditransmisikan secara TDM, sedangkan saluran mundur terdiri atas saluran akses, trafik, pilot, DRC, ACK, dan indikator laju data.
3. Dokumen ini juga menjelaskan
Protokol 1xEV-DO terdiri dari beberapa lapisan protokol mulai dari lapisan fisik hingga lapisan aplikasi. Lapisan-lapisan protokol tersebut meliputi protokol fisik, MAC, lapisan koneksi, sesi, aliran, dan aplikasi. Protokol-protokol default yang digunakan antara lain protokol sinyal, protokol paket, dan protokol aliran.
1. PBX memungkinkan pengguna internal untuk melakukan panggilan dan menerima panggilan eksternal melalui trunk. Contohnya adalah DS1 trunk yang dapat menangani 24 panggilan sekaligus.
2. Terdapat 3 komponen utama PBX yaitu kontrol kompleks, antarmuka terminal, dan jaringan switching. Switching dapat berbasis waktu atau ruang.
3. IP PBX menggunakan teknologi IP dan terdiri dari router/server PBX, gateway,
Ringkasan dokumen tersebut adalah: (1) dokumen tersebut membahas konsep protokol dan model OSI serta TCP/IP; (2) Model OSI dan TCP/IP menjelaskan arsitektur protokol yang digunakan pada internet dan jaringan komersial; (3) Dokumen tersebut juga menjelaskan konsep layering pada model OSI dan TCP/IP.
Modul ini membahas tentang fungsi dan protokol layer jaringan serta karakteristik Internet Protocol. Fungsi utama layer jaringan adalah pengalamatan dan routing untuk mentransfer data melalui jaringan dengan memilih jalur terbaik. Internet Protocol bersifat connectionless, best effort, dan independen terhadap media. Router berperan menghubungkan jaringan dengan menganalisis alamat tujuan paket dan menggunakan tabel routing.
2. Topik Bahasan
- Definisi Traffic Engineering
- Cara Kerja MPLS-TE
-CSPF
-RSVP-TE
- Fast Reroute
2
3. Definisi ‘Traffic Engineering’
Proses mengatur aliran trafik dalam jaringan untuk mengoptimalkan
penggunaan resource dan performansi jaringan.
Secara praktis ini berarti :
memilih rute untuk menangani traffic load, network state, dan user
requirement seperti QoS dan bandwidth,
dapat memindahkan trafik dari path dengan kongesti lebih besar ke
path dengan kongesti lebih kecil
TE untuk MPLS disebut MPLS-TE
3 Modul 1 - 3
4. Tradisional Routing
Router memilih lintasan terpendek tanpa
mempertimbangkan faktor lain seperti bandwidth.
Jika kongesti terjadi, tidak ada perpindahan trafik ke
lintasan yang lain.
4 Modul 1 - 4
5. Solusi TE
Service yang membutuhkan 40 Mbps dilewatkan pada lintasan-1 :
Router A -> C -> G -> F -> H
Service yang membutuhkan 70 Mbps dilewatkan pada lintasan-2 :
Router A -> C -> D -> E -> F -> H
Kongesti dapat dihindari
5 Modul 1 - 5
6. Cara Kerja MPLS-TE
Distribusi Informasi Link
ISIS-TE
OSPF-TE
Path Calculation
CSPF
LSP Setup
RSVP-TE / CR-LDP
Data Forwarding
6 Modul 1 - 6
7. Distribusi Informasi Link - ISIS/OSPF
Bertujuan membagi informasi topologi
network ke semua LSR.
Dibutuhkan modifikasi pada protokol routing
OSPF-TE
- Informasi TE dibawa dengan :
Opaque LSA
IS-IS-TE
- Informasi TE dibawa dengan : New
TLV
Node-node TE membangun suatu Topology
Database (Traffic Engineering Database)
7 Modul 1 - 7
8. OSPF-TE
Opaque LSA Header
Type = 10 => area-local
type-9 : link-local
type-11 : AS
LSA ID = 1 (TE)
8 Modul 1 - 8
10. Traffic Engineering Database
TED digunakan oleh CSPF (Constrained Shortest Path First ) untuk
kalkulasi lintasan eksplisit
Mirip dengan IGP link-state database
Berisi informai tentang :
Atribut link network
Informasi topologi yang terbaru
Terpisah dengan IGP database
10 Modul 1 - 10
11. Path Calculation
Traffic Engineering Database
sebagai input perhitungan lintasan
Menggunakan protokol CSPF
(Constrained Shortest Path First )
Node TE dapat melakukan
constraint-based routing
11 Modul 1 - 11
12. Definisi CSPF - Constrained Shortest Path First
Algoritma link state yang digunakan dalam menghitung lintasan untuk
suatu label-switched paths (LSP) dengan multiple constraint
Modifikasi algoritma “shortest path first”
CSPF tidak hanya mempertimbangkan topologi jaringan, tetapi juga user
constraint (atribut LSP dan link)
User Constraint :
LSP attributes
- Bandwidth requirements
- Hop limitations
- Administrative groups
- Priority
- Explicit route (strict or loose)
Link attributes
- Reservable bandwidth
- Administrative groups
12 Modul 1 - 12
13. Komponen CSPF
(Extended IGP)
OSPF-TE
ISIS-TE
Link State TED CSPF User
Traffic Engineering
Database Database calculation Constraint
ERO
LSP
RSVP
Setup
13 Modul 1 - 13
14. LSP SET-UP
Tipe LSP :
Static LSP
Signaled LSP
CR-LDP-signaled LSP
RSVP-signaled LSP:
- Dibagi atas 2 tipe :
Explicit-path LSP
Constrained-path LSP
14 Modul 1 - 14
15. Static vs Signaled LSP
Static LSPs
Label MPLS dikonfigur secara manual
Membutuhkan konfigurasi pada setiap router
Tidak dapat re-route jika terjadi kegagalan link
Signaled LSP
LSP disetup menggunakan signaling protocol
- RSVP , CR-LDP
Label MPLS ditetapkan secara dinamis
Konfigurasi hanya pada ingress router
Dapat reroute jika failure
15 Modul 1 - 15
16. Signaled Label-Switched Path
Konfigur hanya pada ingress router
RSVP melakukan setup pada transit dan egress router secara
otomatis
Lintasan dipilih pada setiap hop menggunakan routing table
Intermediate hop ditetapkan sebagai “transit points”
Kelebihan dibanding „static path‟
Melakukan “keepalive” checking
Mendukung fail-over ke secondary LSP
Excellent visibility
16 Modul 1 - 16
17. Statik LSP
Label harus dikonfigur secara manual pada semua router
(ingress, transit, egress).
Tidak memerlukan protokol signaling.
R1 R2 R3 R4
(Ingress) (Egress)
LSP
10.60.0.0/16 Label 40 Label 45 Label 50
Nexthop R2 Nexthop R3 Nexthop R4 Pop
Push 40 Swap 45 Swap 50
17 Modul 1 - 17
18. CR-LDP (Constraint-based Routing LDP)
• Protocol Signaling untuk mendistribusikan label yang mendukung QoS dan
traffic engineering
• Merupakan pengembangan dari LDP yang membawa permintaan reservasi
resource berdasarkan user dan network constraint.
• CR-LDP menggunakan sesi TCP antara LSR peer untuk mengirimkan LDP
messages
18 Modul 1 - 18
19. RSVP TE
Resource ReServation Protocol - TE
19 Modul 1 - 19
20. RSVP-TE
Protokol signaling untuk reservasi resource sepanjang route
Menyediakan QOS end-to-end
Didesign untuk host-to-host
Menggunakan IGP untuk menetapkan lintasan
RFC 2205
20 Modul 1 - 20
21. RSVP-TE
Simplex flow
Ingress router memulai koneksi
Path message dikirimkan pada downstream
Resv message dikirimkan pada upstream
RSVP-TE Object
21 Modul 1 - 21
22. Trunk Admission Control
Menentukan apakah node memiliki ketersediaan resource yang
cukup untuk menyuplai QoS yang diminta.
PATH message
Router akan melakukan pengecekan terhadap bandwidth yang
tersedia
Jika tersedia , reservasi diterima
PATH message dikirimkan ke next hop (downstream)
RESV message
Label dialokasikan
22 Modul 1 - 22
23. RSVP-TE : PATH Message
PATH message digunakan untuk request label
R1 mengirimkan PATH message yang ditujukan ke R9
23
23
24. RSVP-TE : RESV Message
RESV digunakan untuk mendistribusikan label setelah menerima Path
Message
R9 mengirimkan RESV message, dengan label=3, ke R8
R8 dan R4 menyimpan “outbound” label dan mengalokasikan
“inbound” label, kemudian mengirimkan RESV ke upstream LSR
24
24
25. Explicit Route
Kemampuan untuk menentukan route LSP pada network
MPLS
Ditetapkan sebagai deretan alamat router antara ingress LER
dan egress LER
2 tipe eksplisit route :
Loose routes, menggunakan routing table untuk menemukan
destination
Strict routes, menetapkan next router yang terhubung langsung
Menggunakan Explicit Route Object (ERO) pada Path
Message
25 Modul 1 - 25
26. Strict Explicit Paths
menetapkan next router yang terhubung langsung
26 Modul 1 - 26
30. Operasi RSVP-TE
Label Request
Destination
Explicit Route 10.1.1.21 with
10.1.1.7 Strict router alert set
10.1.1.21 Loose
Traffic Parameters
2 Mbps CDR
Session attribute Path IP
Setup Priority 4
Holding Priority 3
10.1.1.1
Route Pinning Label Request 10.1.1.7
10.1.1.1
Sender information
30 Modul 1 - 30
31. Operasi RSVP-TE
Label Request
Destination
Explicit Route 10.1.1.21 with
10.1.1.21 Loose router alert set
Traffic Parameters
2 Mbps CDR
Session attribute
Setup Priority 4
Holding Priority 3
Path IP
Route Pinning
10.1.1.7 10.1.1.7 10.1.1.7 10.1.1.6
10.1.1.1 • Records previous hop
Sender information • Label Request object
• Session
• Sender
•
31 Modul 1 - 31
32. Operasi RSVP-TE
Label Request
Destination
Explicit Route
10.1.1.21 with
10.1.1.21 Loose router alert set
Traffic Parameters
2 Mbps CDR
Session attribute
Setup Priority 4
Holding Priority 3 Path IP
Route Pinning
10.1.1.6 10.1.1.6 10.1.1.6 10.1.1.21
10.1.1.7
10.1.1.1
• Records previous hop
Sender information
• Label Request object
• Session
• Sender
32 Modul 1 - 32
33. Operasi RSVP-TE
10.1.1.21
• Alokasi Label
Destination
10.1.1.1 with Label Mapping
router alert set 0
Traffic Parameters
2 Mbps CDR
Session attribute
IP Resv Setup Priority 4
Holding Priority 3
Route Pinning
10.1.1.6 10.1.1.21 10.1.1.21
10.1.1.6
10.1.1.7
10.1.1.1
33 Modul 1 - 33
34. Operasi RSVP-TE
10.1.1.6
• Alokasi Label
Destination
10.1.1.1 with Label Mapping
router alert set 84
Traffic Parameters
2 Mbps CDR
Session attribute
IP Resv Setup Priority 4
Holding Priority 3
Route Pinning
10.1.1.7 10.1.1.6 10.1.1.21
10.1.1.6
10.1.1.7
10.1.1.1
34 Modul 1 - 34
35. Operasi RSVP-TE
10.1.1.6
• Alokasi Label
Destination
10.1.1.1 with Label Mapping
router alert set 86
Traffic Parameters
2 Mbps CDR
Session attribute
IP Resv Setup Priority 4
Holding Priority 3
Route Pinning
10.1.1.1 10.1.1.6 10.1.1.21
10.1.1.6
10.1.1.7
10.1.1.1
35 Modul 1 - 35
36. Operasi RSVP-TE
10.1.1.5 10.1.1.6 10.1.1.21
10.1.1.2 IP 0
10.1.1.1
IP 86
10.1.1.7
RSVP-TE LSP
36 Modul 1 - 36
37. CR-LDP dan RSVP-TE
CR-LDP RSVP-TE
LDP Classical RSVP History
TCP IP Transport
Label Request/Mapping Path and Resv. Messages
Hard Soft
No refreshes Periodic refreshes
State
Explicit setup Explicit Setup
and teardown Implicit teardown
ATM-TM Int-Serv QoS Model
NO Yes Layer 3 ID
Strict and Loose hops Explicit Routing
8 Setup and Holding Priorities LSP Preemption
32 colour designation None Resource Constraint
37 Modul 1 - 37
39. MPLS-TE : Fast Re-Route (FRR)
Fast Restoration : Subsecond
recovery dalam mengatasi
kegagalan node/link
Mekanisme untuk meminimalkan
packet loss selama terjadi
kegagalan .
Scalable 1:N proteksi
Alternatif Cost-effective untuk
proteksi optik – APS
39 Modul 1 - 39
40. FAST REROUTE (FRR)
Fast Reroute : Mekanisme Proteksi terhadap MPLS-TE
FRR melakukan proteksi terhadap :
LINK FAILURE
- Contoh : Fibre cut, Carrier Loss, ADM failure
NODE FAILURE
- Contoh : power failure, hardware crash, maintenance
40 Modul 1 - 40
41. Link Protection*
Router A Router B Router D Router E
Router X Router Y
Router C
Primary Tunnel: A -> B -> D -> E
BackUp Tunnel: B -> C -> D (Pre-provisioned)
Recovery = ~50ms
41
41
42. Node Protection
Router A Router B Router D Router E Router F
Router X Router C Router Y
Primary Tunnel: A -> B -> D -> E -> F
BackUp Tunnel: B -> C -> E (Pre-provisioned)
Recovery = ~100ms
42
42