The document provides an overview presentation on Shortest Path Bridging (802.1aq) given by Peter Ashwood-Smith at PLNOG in Warsaw on March 5th 2012. The presentation covers the challenges 802.1aq addresses, what 802.1aq is, its applications such as data center networks and wireless backhaul, how it works using IS-IS for routing computations, its current status with deployments and trials, and concludes with a demonstration of an 802.1aq network in the presenter's lab.
1) MPLS introduces labels that are prefixed to packet headers and allows forwarding based on these labels instead of long IP addresses, enabling traffic engineering.
2) Labels are assigned based on forward equivalence classes which group packets that should follow the same path. This path is called a label switched path (LSP).
3) Generalized MPLS (GMPLS) extends MPLS to support a wider range of network types and interfaces beyond IP routers, including support for optical and time-division multiplexing networks. It enhances signaling protocols and introduces hierarchical LSP setup.
This document provides an overview of MPLS (Multiprotocol Label Switching) including:
- MPLS uses labels instead of IP addresses to forward packets for benefits like decreased routing overhead and support for non-IP protocols.
- Key MPLS terminology includes label-switched routers that forward packets based on labels, edge routers that impose/remove labels, and label switched paths that define the path through the network.
- The MPLS control plane establishes label switched paths and the data plane uses forwarding based on pre-established labels for faster switching compared to IP routing.
MPLS enables packets to be forwarded based on labels rather than IP addresses. PE routers add labels to incoming packets and remove labels from outgoing packets. P routers swap or pop labels to forward packets. MPLS with L3 VPN allows private networks in different locations to communicate securely over a shared infrastructure by associating routes with virtual routing instances (VRFs) and advertising them using BGP. An example configuration shows VRF and BGP configuration, along with commands to view MPLS label bindings and packet forwarding information.
This document provides an overview of MPLS (Multi-Protocol Label Switching) including its motivation, basics, components, operation, and advantages/disadvantages. MPLS was created to combine the fast packet forwarding of ATM with the flexibility of IP by using labels to direct network traffic. Key components include label edge routers that apply/remove labels, label switching routers that forward based on labels, label distribution protocols to disseminate label mappings, and label switched paths that represent forwarding equivalency classes. MPLS allows for traffic engineering, quality of service, and network scalability.
“MPLS is that it’s a technique, not a service.”
The fundamental concept behind MPLS is that of labeling packets. In a traditional routed IP network,
each router makes an independent forwarding decision for each packet based solely on the packet’s
network-layer header. Thus, every time a packet arrives at a router, the router has to “think through”
where to send the packet next.
VLAN Trunking Protocol (VTP) is a Cisco proprietary protocol that propagates the definition of Virtual
Local Area Networks (VLAN) on the whole local area network.[1] To do this, VTP carries VLAN
information to all the switches in a VTP domain. VTP advertisements can be sent over ISL, 802.1Q, IEEE
802.10 and LANE trunks. VTP is available on most of the Cisco Catalyst Family products.
Presentation on MPLS (Multi Protocol Label Switching)BalaMurugan948
MPLS is a routing technique that establishes an end-to-end path between a source and destination using labels. It builds a connection-oriented service on IP networks by using labels to set up the path in a hop-by-hop manner. MPLS makes IP routing faster by reducing the number of routing lookups and eliminates the need to run routing protocols on all devices. It is protocol independent and maps IP addresses to fixed length labels to forward traffic.
This document provides an overview of virtual local area networks (VLANs). It defines VLANs and discusses why they are used to logically segment physical networks. VLAN trunking is described as using a trunk port to interconnect VLAN switches. VLAN tagging is explained as a method to identify packets traversing trunk links by adding a tag to frames. Different types of VLANs are outlined such as static, dynamic, data, management, default and native. Finally, advantages like increased performance and disadvantages like management complexity are highlighted.
1) MPLS introduces labels that are prefixed to packet headers and allows forwarding based on these labels instead of long IP addresses, enabling traffic engineering.
2) Labels are assigned based on forward equivalence classes which group packets that should follow the same path. This path is called a label switched path (LSP).
3) Generalized MPLS (GMPLS) extends MPLS to support a wider range of network types and interfaces beyond IP routers, including support for optical and time-division multiplexing networks. It enhances signaling protocols and introduces hierarchical LSP setup.
This document provides an overview of MPLS (Multiprotocol Label Switching) including:
- MPLS uses labels instead of IP addresses to forward packets for benefits like decreased routing overhead and support for non-IP protocols.
- Key MPLS terminology includes label-switched routers that forward packets based on labels, edge routers that impose/remove labels, and label switched paths that define the path through the network.
- The MPLS control plane establishes label switched paths and the data plane uses forwarding based on pre-established labels for faster switching compared to IP routing.
MPLS enables packets to be forwarded based on labels rather than IP addresses. PE routers add labels to incoming packets and remove labels from outgoing packets. P routers swap or pop labels to forward packets. MPLS with L3 VPN allows private networks in different locations to communicate securely over a shared infrastructure by associating routes with virtual routing instances (VRFs) and advertising them using BGP. An example configuration shows VRF and BGP configuration, along with commands to view MPLS label bindings and packet forwarding information.
This document provides an overview of MPLS (Multi-Protocol Label Switching) including its motivation, basics, components, operation, and advantages/disadvantages. MPLS was created to combine the fast packet forwarding of ATM with the flexibility of IP by using labels to direct network traffic. Key components include label edge routers that apply/remove labels, label switching routers that forward based on labels, label distribution protocols to disseminate label mappings, and label switched paths that represent forwarding equivalency classes. MPLS allows for traffic engineering, quality of service, and network scalability.
“MPLS is that it’s a technique, not a service.”
The fundamental concept behind MPLS is that of labeling packets. In a traditional routed IP network,
each router makes an independent forwarding decision for each packet based solely on the packet’s
network-layer header. Thus, every time a packet arrives at a router, the router has to “think through”
where to send the packet next.
VLAN Trunking Protocol (VTP) is a Cisco proprietary protocol that propagates the definition of Virtual
Local Area Networks (VLAN) on the whole local area network.[1] To do this, VTP carries VLAN
information to all the switches in a VTP domain. VTP advertisements can be sent over ISL, 802.1Q, IEEE
802.10 and LANE trunks. VTP is available on most of the Cisco Catalyst Family products.
Presentation on MPLS (Multi Protocol Label Switching)BalaMurugan948
MPLS is a routing technique that establishes an end-to-end path between a source and destination using labels. It builds a connection-oriented service on IP networks by using labels to set up the path in a hop-by-hop manner. MPLS makes IP routing faster by reducing the number of routing lookups and eliminates the need to run routing protocols on all devices. It is protocol independent and maps IP addresses to fixed length labels to forward traffic.
This document provides an overview of virtual local area networks (VLANs). It defines VLANs and discusses why they are used to logically segment physical networks. VLAN trunking is described as using a trunk port to interconnect VLAN switches. VLAN tagging is explained as a method to identify packets traversing trunk links by adding a tag to frames. Different types of VLANs are outlined such as static, dynamic, data, management, default and native. Finally, advantages like increased performance and disadvantages like management complexity are highlighted.
An introduction to MPLS networks and applicationsShawn Zandi
Multiprotocol Label Switching (MPLS) provides label switched path to deliver packets in networks. This is an introduction course to understand different terminologies and concepts associated with MPLS.
This document provides an overview of local area networks (LANs) and virtual LANs (VLANs). It defines LAN as a network covering a small area like a home, office or campus to connect computers in close proximity. The document discusses common LAN topologies like bus, ring and star. It then introduces VLAN as a way to logically segment devices within a LAN even if they share the same infrastructure. The document explains how VLANs work using tags and trunking between switches. It outlines benefits of VLANs like improved security, flexibility and traffic management compared to traditional LANs.
This document discusses load balancing using Per Connection Classifier (PCC) in MikroTik RouterOS. It begins with an introduction and example use case. It then explains that PCC divides incoming data into streams and uses routing rules to distribute traffic across multiple internet connections. Specifically, it uses hashing on packet header fields to sort traffic into streams, and then packet marking and routing tables to ensure each stream follows the designated path out the specified interface. Finally, it stresses the importance of understanding how the various components of the PCC solution work together.
This document discusses ArubaOS switch stacking, including:
- Backplane stacking allows connecting multiple switches together to simplify operations and optimize uplink usage.
- Topologies supported are chain, ring, and mesh, with ring and mesh recommended for redundancy.
- Key functions of stacking include topology discovery, electing a commander and standby, managing members, and handling splits.
- Specific switch models like the 3800 and 2900 series support backplane stacking of up to 10 units in ring topology with stacking throughput of up to 160Gbps.
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)Abdelkhalik Mosa
This document discusses the VLAN Trunking Protocol (VTP). VTP allows network managers to centrally manage VLAN configurations across multiple switches in a domain. It maintains consistency by propagating VLAN changes between switches. The document covers VTP domains, advertisements, modes, pruning, configuration and troubleshooting.
This document discusses the Spanning Tree Protocol (STP) which provides a loop-free network topology by placing ports into blocking states. It describes how STP elects a root bridge, establishes root and designated ports, and transitions ports between blocking and forwarding states. The document also introduces Rapid Spanning Tree Protocol which speeds up STP's recalculation of the spanning tree when the network topology changes.
This document discusses several high-speed LAN technologies including Fast Ethernet, Gigabit Ethernet, 10-Gbps Ethernet, and 100-Gbps Ethernet. It describes the characteristics and advantages of switches over hubs for high-speed networks. Layer 3 switches are able to perform routing at significantly higher speeds than software-based routers. The document also explains why Ethernet remains a popular choice for high-speed networks despite scaling issues with CSMA/CD.
Multi Protocol Label Switching. (by Rahil Reyaz)RAHIL REYAZ
MPLS was developed to address some of the disadvantages of IP and ATM routing. It works by assigning labels to packets at the edge of the network which are then used to forward packets across the core. This label switching allows for faster forwarding than IP routing. MPLS can be used to engineer traffic flows, provide virtual private networks, and transport various layer 2 protocols over an IP or MPLS backbone. While it adds complexity, MPLS improves performance and supports quality of service and network scalability.
Infrastructure as a Service (IaaS) for cloud environments provides compute processing, storage, networks, and other fundamental computing resources. To support multi-tenant cloud environments, IaaS utilizes the various advantages of the virtualization, but con-ventional virtual (overlay) network architectures for IaaS have been a direct cause of scalability limitations in multi-tenant cloud environments. In other words, IaaS’s virtual networks have the limitations due to the problems of high availability and load bal-ancing, etc. To solve these problems, we present EYWA, a virtual network architecture that scales to support huge data centers with high availability, load balancing and large layer-2 semantics. The design of EYWA overcomes the limitations by accommodating (1)a large number of tenants (about 224 = 16,777,216) by using virtual LANs such as logically isolated network with its own IP range in the cloud service providers’ view, and providing (2)public network service per tenant without throughput bottleneck and single point of failure (SPOF) on Source and Destination Network Address Translation (SNAT/DNAT) and (3)a single large IP subnet per tenant by using large layer-2 semantics in the consumers’ view. EYWA combines existing techniques into a decentralized scale-out control and data plane. The only component of EYWA is an agent in every hypervisor host that can control packets and the agents act as distributed controller. As a result, EYWA can be deployed into all the multi-tenant cloud environments today.
In this presentation, we will discuss how IEEE standard 802.3ad and its implications allow third-party devices such as switches, servers, or any other networking device that supports trunking to interoperate with the distributed trunking switches (DTSs) seamlessly. Check out the webinar recording where this presentation was used: http://community.arubanetworks.com/t5/Wired-Intelligent-Edge-Campus/Technical-Webinar-LACP-and-distributed-LACP-ArubaOS-Switch/td-p/458170
Register for the upcoming webinars: https://community.arubanetworks.com/t5/Training-Certification-Career/EMEA-Airheads-Webinars-Jul-Dec-2017/td-p/271908
L3 and Multicasting PPT by NETWORKERS HOMEnetworkershome
The document discusses layer 3 routing and multicasting in a typical enterprise network. It covers layer 3 considerations at the access and aggregation levels, including advantages like smaller layer 2 domains and drawbacks like more configuration points. It also discusses licensing requirements for routing protocols on Nexus platforms, as well as support for protocols like OSPF, EIGRP, and BGP.
MPLS is a forwarding mechanism that uses labels instead of IP addresses to forward packets. It allows routers to forward based on simple label lookups rather than complex routing lookups. MPLS has benefits like supporting multiple applications and decreasing forwarding overhead on core routers. It has a control plane that exchanges routing information and labels, and a data plane that forwards packets based on labels. Label Switch Routers implement MPLS forwarding by exchanging labels and forwarding packets based on those labels.
The document provides information about a training event on Deploy MPLS Traffic Engineering taking place from 20 February to 2 March 2017 in Ho Chi Minh City, Vietnam. It includes details about two presenters - Nurul Islam Roman, Manager of Training & Technical Assistance at APNIC, and Jessica Wei, Training Officer at APNIC. It also acknowledges Cisco Systems and provides an agenda with topics on why MPLS Traffic Engineering is used and how it works.
The document discusses traffic engineering in networks using MPLS. It begins by defining traffic engineering and explaining how shortest path routing can lead to link congestion and underutilized paths. It then describes MPLS, constraint-based routing, and enhanced interior gateway protocols. Constraint-based routing computes paths subject to constraints like bandwidth and policies. MPLS extends routing to control packet forwarding and paths. The document outlines the basic components and functioning of an MPLS system for traffic engineering, including setting up label switched paths (LSPs) with attributes like bandwidth, priority, affinity and establishing multiple LSPs between endpoints to distribute load.
YANG is a data modeling language used to model configuration and state data of network elements. It defines data in a module structure including a header, imports, type definitions and data declarations. YANG is used with the NETCONF protocol for installing, manipulating and deleting configuration on network devices and provides a standard way to model data exchanged between network applications and devices. Many network applications now use YANG to model their data and NETCONF to communicate with network devices.
MPLS is a forwarding scheme that uses fixed-length labels to simplify packet forwarding. It allows explicit routing and fast restoration from failures. MPLS headers carry labels that are used by routers to forward packets based on forwarding equivalence classes. This enables traffic management and quality of service routing. Local protection techniques like bypass tunnels and label stacking allow MPLS to provide fast restoration by pre-establishing backup label switched paths.
This document provides an overview of MPLS basics:
- MPLS integrates Layer 2 switching and Layer 3 routing to satisfy networking requirements for various applications. It groups packets into forwarding equivalence classes (FECs) and assigns each FEC a label.
- Label switching routers (LSRs) establish label switched paths (LSPs) to forward labeled packets hop-by-hop through the MPLS network. The ingress LER labels incoming packets and the egress LER removes labels before forwarding.
- MPLS supports technologies like VPNs and traffic engineering to provide benefits like address multiplexing, QoS, and traffic control capabilities.
this pdf contain simple method to install one of important MPLS service MPLS L3VPN and explain how mpls distribute labels
use simple routing protocol with customer (static route) to initiate L3VPN
Shortest Path Bridging (SPB) provides several key benefits over traditional spanning tree protocols:
1. SPB eliminates blocked ports by using a link-state protocol (IS-IS) to automatically build shortest path trees to all nodes in the network.
2. It enables much faster reconvergence times of hundreds of milliseconds compared to spanning tree.
3. SPB simplifies network operations through well-known link-state routing paradigms and provides one-touch provisioning of services and end-points.
This chapter reviews basic switching concepts as a refresher for the CCNP SWITCH certification, including hubs and switches, bridges and switches, the evolution of switches, broadcast domains, MAC addresses, Ethernet frame formats, basic switching functions, VLANs, spanning tree protocol, trunking, port channels, and multilayer switching. It provides objectives for topics that will be covered in more depth in later chapters.
An introduction to MPLS networks and applicationsShawn Zandi
Multiprotocol Label Switching (MPLS) provides label switched path to deliver packets in networks. This is an introduction course to understand different terminologies and concepts associated with MPLS.
This document provides an overview of local area networks (LANs) and virtual LANs (VLANs). It defines LAN as a network covering a small area like a home, office or campus to connect computers in close proximity. The document discusses common LAN topologies like bus, ring and star. It then introduces VLAN as a way to logically segment devices within a LAN even if they share the same infrastructure. The document explains how VLANs work using tags and trunking between switches. It outlines benefits of VLANs like improved security, flexibility and traffic management compared to traditional LANs.
This document discusses load balancing using Per Connection Classifier (PCC) in MikroTik RouterOS. It begins with an introduction and example use case. It then explains that PCC divides incoming data into streams and uses routing rules to distribute traffic across multiple internet connections. Specifically, it uses hashing on packet header fields to sort traffic into streams, and then packet marking and routing tables to ensure each stream follows the designated path out the specified interface. Finally, it stresses the importance of understanding how the various components of the PCC solution work together.
This document discusses ArubaOS switch stacking, including:
- Backplane stacking allows connecting multiple switches together to simplify operations and optimize uplink usage.
- Topologies supported are chain, ring, and mesh, with ring and mesh recommended for redundancy.
- Key functions of stacking include topology discovery, electing a commander and standby, managing members, and handling splits.
- Specific switch models like the 3800 and 2900 series support backplane stacking of up to 10 units in ring topology with stacking throughput of up to 160Gbps.
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)Abdelkhalik Mosa
This document discusses the VLAN Trunking Protocol (VTP). VTP allows network managers to centrally manage VLAN configurations across multiple switches in a domain. It maintains consistency by propagating VLAN changes between switches. The document covers VTP domains, advertisements, modes, pruning, configuration and troubleshooting.
This document discusses the Spanning Tree Protocol (STP) which provides a loop-free network topology by placing ports into blocking states. It describes how STP elects a root bridge, establishes root and designated ports, and transitions ports between blocking and forwarding states. The document also introduces Rapid Spanning Tree Protocol which speeds up STP's recalculation of the spanning tree when the network topology changes.
This document discusses several high-speed LAN technologies including Fast Ethernet, Gigabit Ethernet, 10-Gbps Ethernet, and 100-Gbps Ethernet. It describes the characteristics and advantages of switches over hubs for high-speed networks. Layer 3 switches are able to perform routing at significantly higher speeds than software-based routers. The document also explains why Ethernet remains a popular choice for high-speed networks despite scaling issues with CSMA/CD.
Multi Protocol Label Switching. (by Rahil Reyaz)RAHIL REYAZ
MPLS was developed to address some of the disadvantages of IP and ATM routing. It works by assigning labels to packets at the edge of the network which are then used to forward packets across the core. This label switching allows for faster forwarding than IP routing. MPLS can be used to engineer traffic flows, provide virtual private networks, and transport various layer 2 protocols over an IP or MPLS backbone. While it adds complexity, MPLS improves performance and supports quality of service and network scalability.
Infrastructure as a Service (IaaS) for cloud environments provides compute processing, storage, networks, and other fundamental computing resources. To support multi-tenant cloud environments, IaaS utilizes the various advantages of the virtualization, but con-ventional virtual (overlay) network architectures for IaaS have been a direct cause of scalability limitations in multi-tenant cloud environments. In other words, IaaS’s virtual networks have the limitations due to the problems of high availability and load bal-ancing, etc. To solve these problems, we present EYWA, a virtual network architecture that scales to support huge data centers with high availability, load balancing and large layer-2 semantics. The design of EYWA overcomes the limitations by accommodating (1)a large number of tenants (about 224 = 16,777,216) by using virtual LANs such as logically isolated network with its own IP range in the cloud service providers’ view, and providing (2)public network service per tenant without throughput bottleneck and single point of failure (SPOF) on Source and Destination Network Address Translation (SNAT/DNAT) and (3)a single large IP subnet per tenant by using large layer-2 semantics in the consumers’ view. EYWA combines existing techniques into a decentralized scale-out control and data plane. The only component of EYWA is an agent in every hypervisor host that can control packets and the agents act as distributed controller. As a result, EYWA can be deployed into all the multi-tenant cloud environments today.
In this presentation, we will discuss how IEEE standard 802.3ad and its implications allow third-party devices such as switches, servers, or any other networking device that supports trunking to interoperate with the distributed trunking switches (DTSs) seamlessly. Check out the webinar recording where this presentation was used: http://community.arubanetworks.com/t5/Wired-Intelligent-Edge-Campus/Technical-Webinar-LACP-and-distributed-LACP-ArubaOS-Switch/td-p/458170
Register for the upcoming webinars: https://community.arubanetworks.com/t5/Training-Certification-Career/EMEA-Airheads-Webinars-Jul-Dec-2017/td-p/271908
L3 and Multicasting PPT by NETWORKERS HOMEnetworkershome
The document discusses layer 3 routing and multicasting in a typical enterprise network. It covers layer 3 considerations at the access and aggregation levels, including advantages like smaller layer 2 domains and drawbacks like more configuration points. It also discusses licensing requirements for routing protocols on Nexus platforms, as well as support for protocols like OSPF, EIGRP, and BGP.
MPLS is a forwarding mechanism that uses labels instead of IP addresses to forward packets. It allows routers to forward based on simple label lookups rather than complex routing lookups. MPLS has benefits like supporting multiple applications and decreasing forwarding overhead on core routers. It has a control plane that exchanges routing information and labels, and a data plane that forwards packets based on labels. Label Switch Routers implement MPLS forwarding by exchanging labels and forwarding packets based on those labels.
The document provides information about a training event on Deploy MPLS Traffic Engineering taking place from 20 February to 2 March 2017 in Ho Chi Minh City, Vietnam. It includes details about two presenters - Nurul Islam Roman, Manager of Training & Technical Assistance at APNIC, and Jessica Wei, Training Officer at APNIC. It also acknowledges Cisco Systems and provides an agenda with topics on why MPLS Traffic Engineering is used and how it works.
The document discusses traffic engineering in networks using MPLS. It begins by defining traffic engineering and explaining how shortest path routing can lead to link congestion and underutilized paths. It then describes MPLS, constraint-based routing, and enhanced interior gateway protocols. Constraint-based routing computes paths subject to constraints like bandwidth and policies. MPLS extends routing to control packet forwarding and paths. The document outlines the basic components and functioning of an MPLS system for traffic engineering, including setting up label switched paths (LSPs) with attributes like bandwidth, priority, affinity and establishing multiple LSPs between endpoints to distribute load.
YANG is a data modeling language used to model configuration and state data of network elements. It defines data in a module structure including a header, imports, type definitions and data declarations. YANG is used with the NETCONF protocol for installing, manipulating and deleting configuration on network devices and provides a standard way to model data exchanged between network applications and devices. Many network applications now use YANG to model their data and NETCONF to communicate with network devices.
MPLS is a forwarding scheme that uses fixed-length labels to simplify packet forwarding. It allows explicit routing and fast restoration from failures. MPLS headers carry labels that are used by routers to forward packets based on forwarding equivalence classes. This enables traffic management and quality of service routing. Local protection techniques like bypass tunnels and label stacking allow MPLS to provide fast restoration by pre-establishing backup label switched paths.
This document provides an overview of MPLS basics:
- MPLS integrates Layer 2 switching and Layer 3 routing to satisfy networking requirements for various applications. It groups packets into forwarding equivalence classes (FECs) and assigns each FEC a label.
- Label switching routers (LSRs) establish label switched paths (LSPs) to forward labeled packets hop-by-hop through the MPLS network. The ingress LER labels incoming packets and the egress LER removes labels before forwarding.
- MPLS supports technologies like VPNs and traffic engineering to provide benefits like address multiplexing, QoS, and traffic control capabilities.
this pdf contain simple method to install one of important MPLS service MPLS L3VPN and explain how mpls distribute labels
use simple routing protocol with customer (static route) to initiate L3VPN
Shortest Path Bridging (SPB) provides several key benefits over traditional spanning tree protocols:
1. SPB eliminates blocked ports by using a link-state protocol (IS-IS) to automatically build shortest path trees to all nodes in the network.
2. It enables much faster reconvergence times of hundreds of milliseconds compared to spanning tree.
3. SPB simplifies network operations through well-known link-state routing paradigms and provides one-touch provisioning of services and end-points.
This chapter reviews basic switching concepts as a refresher for the CCNP SWITCH certification, including hubs and switches, bridges and switches, the evolution of switches, broadcast domains, MAC addresses, Ethernet frame formats, basic switching functions, VLANs, spanning tree protocol, trunking, port channels, and multilayer switching. It provides objectives for topics that will be covered in more depth in later chapters.
Networking - TCP/IP stack introduction and IPv6Rodolfo Kohn
The document discusses IPv6 and Mobile IPv6 fundamentals, new services, and applications. It begins with an introduction to TCP/IP and the Internet and then covers the OSI and TCP/IP reference models. It describes the physical, data link, network, transport, and application layers. It focuses on IPv6 features like addressing, autoconfiguration, and mobility support through Mobile IPv6. It also discusses new applications and challenges with the transition from IPv4 to IPv6.
CCNA Training in Bangalore | Best Networking course in BangaloreTIB Academy
At TIB Academy, you will get the best CCNA training in Bangalore. To clear Cisco CCNA Certification, you need to be very good in basic networking concepts like network topology and network layers. So, enroll in our Networking Course immediately to get the best CCNA training and certification assistance
Sigtran and SS7 over IP technologies allow the transport of SS7 signaling over an IP network. Sigtran defines protocols like SCTP and M3UA that encapsulate SS7 and ensure reliable delivery over IP. A phased deployment strategy migrates SS7 links onto IP in stages to test performance before full conversion. Testing focuses on priority, failure handling, latency, and interoperability to ensure equivalent functionality over IP.
Sigtran and SS7oIP technologies allow the transport of SS7 signaling over IP networks. Sigtran defines protocols like SCTP and M3UA that encapsulate SS7 messages for transport over IP. A phased deployment strategy migrates SS7 links onto SS7oIP devices to realize cost savings. Initial deployments place half the links in a city or STP over IP. Full deployment moves all A, B, and C links to IP. Testing validates capabilities like priority, rerouting, and interoperability before full migration.
This presentation summarizes the Cisco Certified Network Associate (CCNA) certification and covers networking concepts relevant to the CCNA including networking devices, the OSI model, IP addressing, routing, access lists, network address translation, switches, virtual LANs, WAN connection types, wireless technology, and comparisons of 802.11 wireless standards.
This document provides an overview of Cisco's NX-OS operating system and Nexus platforms. It discusses the case for 10GbE connectivity to servers, how NX-OS is purpose-built for the data center, and how it provides increased efficiency and simpler operations through a unified fabric. It then reviews the Nexus 7000, 5000, 2000 and hardware and software versions. Key NX-OS features like Layer 2/3, routing protocols, VRFs, FabricPath, VDCs, FCoE, vPCs and OTV are summarized.
PLNOG16: Data center interconnect dla opornych, Krzysztof MazepaPROIDEA
This document discusses data center interconnect (DCI) solutions for extending layer 2 domains across multiple sites. It introduces Overlay Transport Virtualization (OTV) as an IP-based solution that uses "MAC in IP" techniques to extend layer 2 connectivity over any transport network while containing failures and preserving resiliency. OTV uses control-plane learning and IS-IS routing to advertise MAC reachability between sites and elect a single edge device per VLAN to forward traffic. This allows OTV to provide layer 2 extensions across metro or global distances while isolating spanning tree domains and preventing unknown unicast flooding beyond site boundaries.
The document provides an overview of Software Defined Networking (SDN). It discusses the history and disadvantages of traditional networking approaches. It then defines SDN, describing its architecture and key components like the data plane, control plane, and management plane. It outlines the needs and benefits of SDN, such as virtualization, orchestration, programmability, and automation. It also covers SDN concepts like the OpenFlow protocol and SDN controllers.
This document discusses data center fabric architectures and HPE's approach. It begins with defining the goals of a data center fabric and how graph theory can help design efficient topologies. It then covers common fabric designs like CLOS/fat tree and discusses their advantages. The document presents HPE's flexible approach using software-defined networking and outlines options for building fabrics with layer 2, layer 3, or overlays. It also covers capabilities like LAN/SAN convergence, data center interconnect, and network virtualization. Finally, it introduces HPE's Altoline/OpenSwitch platform as an open network operating system.
The document discusses several topics related to computer networking including network topologies, physical and logical topologies, OSI and TCP/IP models, IP addressing, subnetting, routers, routing protocols, VLANs, and data flow diagrams. It provides information on LAN/MAN/WAN standards, the seven layers of the OSI model, classes of IP addresses, configuring router interfaces, routing protocols like OSPF and EIGRP, using VLANs to segment networks, and creating basic data flow diagrams.
1) The document discusses 6LoWPAN (IPv6 over Low-Power Wireless Personal Area Networks), which allows IPv6 packets to be sent over IEEE 802.15.4 low-power networks.
2) A key challenge is that the large IPv6 address and header do not fit efficiently into the small 802.15.4 frames, so 6LoWPAN defines header compression methods.
3) 6LoWPAN defines a dispatch byte and optional headers for mesh routing, header compression, and fragmentation to optimize IPv6 packets for transmission over 802.15.4 networks.
This document summarizes the Railnet system setup at the Gorakhpur headquarters of the North Eastern Railway zone in India. It describes the core network equipment used, including STM-1 fiber modules, Cisco routers and switches, modems, mail servers, LAN extenders and media converters. Power is supplied through UPS units and maintenance free batteries. Common failures like power outages and link errors are troubleshooted. Suggestions to minimize failures include proper installation, maintenance of temperature and power supply, and scheduled maintenance. The project helped provide understanding of the Railnet technology and connectivity used across the network.
This document summarizes the Railnet system setup at the Gorakhpur division of the North Eastern Railway zone in India. It describes the key components of the Railnet including STM-1 equipment, routers, switches, modems, mail servers, LAN extenders and media converters. It also discusses the VLAN configuration, IP addresses, features, power supply, earthing, common failures and troubleshooting steps. The objective of the Railnet project is to provide computer connectivity across various railway organizations for information sharing.
The IEEE 802 is a family of IEEE standards dealing with Local Area Networks and Metropolitan Area Networks. The IEEE 802 family of standards is maintained by the IEEE 802 LAN/MAN Standards Committee (LMSC).
The most widely used standards are for the Bridging and Virtual Bridged LANs (802.1), Ethernet family (802.3), Token Ring (802.5) and Wireless LAN (802.11).
This document discusses network virtualization and its history. It provides the following key points:
1) Network virtualization aims to decouple virtual networks from physical infrastructure through techniques like tunneling and encapsulation, allowing independent address spaces and topologies.
2) Early work included overlay networks for deployment and experimentation. Virtualization is now used in data centers to isolate tenant traffic and connect virtual machines across sites.
3) The OpenVirteX project aims to advance network virtualization by exposing the entire physical topology to virtual network controllers and allowing independent address spaces and topologies through header rewriting. This would provide more flexibility than existing solutions.
The document provides an overview of traditional campus network designs and introduces some concepts for campus network design. It discusses traditional router and hub campus designs and moves to newer designs using virtual LAN (VLAN) technologies and multilayer switching. The key concepts covered include the access, distribution and core layers, switch blocks, core blocks, and considerations around sizing and redundancy in campus network designs.
The document discusses network layering models and TCP/IP fundamentals. It describes:
1. Networking problems are divided into layers for easier understanding and standardization, with the two main models being OSI and TCP/IP.
2. The TCP/IP model has four or five layers - process, host-to-host transport, internet, network access, and sometimes physical.
3. Packets are encapsulated as they leave a machine and decapsulated on the receiving host, with each layer adding headers.
Similar to PLNOG 8: Peter Ashwood-Smith - Shortest Path Bridging IEEE 802.1aq (20)
This presentation by OECD, OECD Secretariat, was made during the discussion “Artificial Intelligence, Data and Competition” held at the 143rd meeting of the OECD Competition Committee on 12 June 2024. More papers and presentations on the topic can be found at oe.cd/aicomp.
This presentation was uploaded with the author’s consent.
XP 2024 presentation: A New Look to Leadershipsamililja
Presentation slides from XP2024 conference, Bolzano IT. The slides describe a new view to leadership and combines it with anthro-complexity (aka cynefin).
This presentation by Nathaniel Lane, Associate Professor in Economics at Oxford University, was made during the discussion “Pro-competitive Industrial Policy” held at the 143rd meeting of the OECD Competition Committee on 12 June 2024. More papers and presentations on the topic can be found at oe.cd/pcip.
This presentation was uploaded with the author’s consent.
This presentation by Yong Lim, Professor of Economic Law at Seoul National University School of Law, was made during the discussion “Artificial Intelligence, Data and Competition” held at the 143rd meeting of the OECD Competition Committee on 12 June 2024. More papers and presentations on the topic can be found at oe.cd/aicomp.
This presentation was uploaded with the author’s consent.
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie WellsRosie Wells
Insight: In a landscape where traditional narrative structures are giving way to fragmented and non-linear forms of storytelling, there lies immense potential for creativity and exploration.
'Collapsing Narratives: Exploring Non-Linearity' is a micro report from Rosie Wells.
Rosie Wells is an Arts & Cultural Strategist uniquely positioned at the intersection of grassroots and mainstream storytelling.
Their work is focused on developing meaningful and lasting connections that can drive social change.
Please download this presentation to enjoy the hyperlinks!
This presentation by Professor Alex Robson, Deputy Chair of Australia’s Productivity Commission, was made during the discussion “Competition and Regulation in Professions and Occupations” held at the 77th meeting of the OECD Working Party No. 2 on Competition and Regulation on 10 June 2024. More papers and presentations on the topic can be found at oe.cd/crps.
This presentation was uploaded with the author’s consent.
This presentation by Juraj Čorba, Chair of OECD Working Party on Artificial Intelligence Governance (AIGO), was made during the discussion “Artificial Intelligence, Data and Competition” held at the 143rd meeting of the OECD Competition Committee on 12 June 2024. More papers and presentations on the topic can be found at oe.cd/aicomp.
This presentation was uploaded with the author’s consent.
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...SkillCertProExams
• For a full set of 760+ questions. Go to
https://skillcertpro.com/product/databricks-certified-data-engineer-associate-exam-questions/
• SkillCertPro offers detailed explanations to each question which helps to understand the concepts better.
• It is recommended to score above 85% in SkillCertPro exams before attempting a real exam.
• SkillCertPro updates exam questions every 2 weeks.
• You will get life time access and life time free updates
• SkillCertPro assures 100% pass guarantee in first attempt.
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...Suzanne Lagerweij
This is a workshop about communication and collaboration. We will experience how we can analyze the reasons for resistance to change (exercise 1) and practice how to improve our conversation style and be more in control and effective in the way we communicate (exercise 2).
This session will use Dave Gray’s Empathy Mapping, Argyris’ Ladder of Inference and The Four Rs from Agile Conversations (Squirrel and Fredrick).
Abstract:
Let’s talk about powerful conversations! We all know how to lead a constructive conversation, right? Then why is it so difficult to have those conversations with people at work, especially those in powerful positions that show resistance to change?
Learning to control and direct conversations takes understanding and practice.
We can combine our innate empathy with our analytical skills to gain a deeper understanding of complex situations at work. Join this session to learn how to prepare for difficult conversations and how to improve our agile conversations in order to be more influential without power. We will use Dave Gray’s Empathy Mapping, Argyris’ Ladder of Inference and The Four Rs from Agile Conversations (Squirrel and Fredrick).
In the session you will experience how preparing and reflecting on your conversation can help you be more influential at work. You will learn how to communicate more effectively with the people needed to achieve positive change. You will leave with a self-revised version of a difficult conversation and a practical model to use when you get back to work.
Come learn more on how to become a real influencer!
Carrer goals.pptx and their importance in real lifeartemacademy2
Career goals serve as a roadmap for individuals, guiding them toward achieving long-term professional aspirations and personal fulfillment. Establishing clear career goals enables professionals to focus their efforts on developing specific skills, gaining relevant experience, and making strategic decisions that align with their desired career trajectory. By setting both short-term and long-term objectives, individuals can systematically track their progress, make necessary adjustments, and stay motivated. Short-term goals often include acquiring new qualifications, mastering particular competencies, or securing a specific role, while long-term goals might encompass reaching executive positions, becoming industry experts, or launching entrepreneurial ventures.
Moreover, having well-defined career goals fosters a sense of purpose and direction, enhancing job satisfaction and overall productivity. It encourages continuous learning and adaptation, as professionals remain attuned to industry trends and evolving job market demands. Career goals also facilitate better time management and resource allocation, as individuals prioritize tasks and opportunities that advance their professional growth. In addition, articulating career goals can aid in networking and mentorship, as it allows individuals to communicate their aspirations clearly to potential mentors, colleagues, and employers, thereby opening doors to valuable guidance and support. Ultimately, career goals are integral to personal and professional development, driving individuals toward sustained success and fulfillment in their chosen fields.
Why Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdfBen Linders
Psychological safety in teams is important; team members must feel safe and able to communicate and collaborate effectively to deliver value. It’s also necessary to build long-lasting teams since things will happen and relationships will be strained.
But, how safe is a team? How can we determine if there are any factors that make the team unsafe or have an impact on the team’s culture?
In this mini-workshop, we’ll play games for psychological safety and team culture utilizing a deck of coaching cards, The Psychological Safety Cards. We will learn how to use gamification to gain a better understanding of what’s going on in teams. Individuals share what they have learned from working in teams, what has impacted the team’s safety and culture, and what has led to positive change.
Different game formats will be played in groups in parallel. Examples are an ice-breaker to get people talking about psychological safety, a constellation where people take positions about aspects of psychological safety in their team or organization, and collaborative card games where people work together to create an environment that fosters psychological safety.
This presentation by OECD, OECD Secretariat, was made during the discussion “Pro-competitive Industrial Policy” held at the 143rd meeting of the OECD Competition Committee on 12 June 2024. More papers and presentations on the topic can be found at oe.cd/pcip.
This presentation was uploaded with the author’s consent.
This presentation by OECD, OECD Secretariat, was made during the discussion “Competition and Regulation in Professions and Occupations” held at the 77th meeting of the OECD Working Party No. 2 on Competition and Regulation on 10 June 2024. More papers and presentations on the topic can be found at oe.cd/crps.
This presentation was uploaded with the author’s consent.
This presentation by Thibault Schrepel, Associate Professor of Law at Vrije Universiteit Amsterdam University, was made during the discussion “Artificial Intelligence, Data and Competition” held at the 143rd meeting of the OECD Competition Committee on 12 June 2024. More papers and presentations on the topic can be found at oe.cd/aicomp.
This presentation was uploaded with the author’s consent.
PLNOG 8: Peter Ashwood-Smith - Shortest Path Bridging IEEE 802.1aq
1. Shortest Path Bridging
IEEE 802.1aq
PLNOG
Warsaw
March 5th 2012
Peter Ashwood-Smith
peter.ashwoodsmith@huawei.com
2. 2
Abstract
802.1aq Shortest Path Bridging is being standardized by the IEEE as an
evolution of the various spanning tree protocols. 802.1aq allows for true
shortest path routing, multiple equal cost paths, much larger layer 2
topologies, faster convergence, vastly improved use of the mesh topology,
single point provisioning for logical membership (E-LINE/E-LAN/E-TREE
etc), abstraction of attached device MAC addresses from the transit
devices, head end and/or transit multicast replication , all while supporting
the full suit of 802.1 OA&M.
Applications consist of STP replacement, Data Center L2 fabric control,
L2 Internet Distributed Exchange point fabric control, small to medium
sized Metro Ethernet control planes. L2 wireless network backhaul….
3. 3
Outline
• Challenges
• What is 802.1aq/SPB
• Applications
• How does it work
• Status
• Quick Demo (Internet willing)
4. 4
Challenges
• L2 networks that scale to ~1000 bridges.
• Use of arbitrary mesh topologies.
• Use of (multiple) shortest paths.
• Efficient broadcast/multicast routing and replication points.
• Avoid address learning by tandem devices.
• Get recovery times into 100’s of millisecond range for larger
topologies.
• Good scaling without loops.
• Allow creation of very many logical L2 topologies (subnets)
of arbitrary span.
• Maintain all L2 properties within the logical L2 topologies
(transparency, ordering, symmetry, congruence, shortest
path etc).
• Reuse all existing Ethernet OA&M 802.1ag/Y.1731
“Make a network of switches look like a single switch!”
5. 5
Example problems of scaling up
Native Ethernet
ROOT
1- Can’t use
these links
Source
Dest
A1.. A100
3 – Must learn A1..A100
2- poor
routes
6. 6
Outline
• Challenges
• What is 802.1aq/SPB
• Applications
• How does it work
• Status
• Quick Demo (Internet willing)
7. 7
What is 802.1aq/SPB
• IEEE protocol builds on 802.1 standards
• A new control plane for Q-in-Q and M-in-M
– Leverage existing inexpensive ASICs
– Q-in-Q mode called SPBV
– M-in-M mode called SPBM
• Backward compatible to 802.1
– 802.1ag, Y.1731, Data Center Bridging suite
• Multiple loop free shortest paths routing
– Excellent use of mesh connectivity
– Currently 16, path to 1000’s including hashed per
hop.
• Optimum multicast
– head end or tandem replication
8. 8
What is 802.1aq/SPB (cont’d)
• Light weight form of traffic engineering
– Head end assignment of traffic to 16 shortest paths.
– Deterministic routing - offline tools predict exact routes.
• Scales to ~1000 or so devices
– Uses IS-IS already proven well beyond 1000.
– Huge improvement over the STP scales.
• Good convergence with minimal fuss
– sub second (modern processor, well designed)
– below 100ms (use of hardware multicast for updates)
– Includes multicast flow when replication point dies.
Pre-standard seeing 300ms recovery @ ~50 nodes.
• IS-IS
– Operate as independent IS-IS instance, or within IS-
IS/IP, supports Multi Topology to allow multiple
instances efficiently.
9. 9
What is 802.1aq/SPB (cont’d)
• Membership advertised in same protocol as
topology.
– Minimizes complexity, near plug-and-play
– Support E-LINE/E-LAN/E-TREE
– All just variations on membership attributes.
• Address learning restricted to edge (M-in-M)
– FDB is computed and populated just like a router.
– Unicast and Multicast handled at same time.
– Nodal or Card/Port addressing for dual homing.
• Computations guarantee ucast/mcast…
– Symmetry (same in both directions)
– Congruence (unicast/multicast follow same route)
– Tune-ability (currently 16 equal costs paths – opaque
allows more)
10. 10
SPBM creates logical L2 networks
on a physical L2 network.
ISID 5,000
ISID 15000
ISID 80,000
ISID
60,000
ISID
100,000
224 ‘services’ possible
with 24 bit ISID
‘service’ membership
Is computed not learned!
11. 11
Edge Learning - Visually
:B
:A
Learn A via 1!
A|B?
Learning restricted to edges
and only where I-SID tree
reaches. Mac-in-Mac encap.
Learn B via 20!
Src.C-MAC
Dst.C-MAC
801.1AH/ I-SID
B-VLAN
C-VLAN
Payload
Src.B-MAC
Dst.B-MAC
FIB
To: 20 next Hop =>
To: 1 next Hop <=
ISID-255
ISID-255
ISID-255
ISID-255
ISID-255
ISID-255
ISID-255
ISID-255
13. 13
Outline
• Challenges
• What is 802.1aq/SPB
• Applications
• How does it work
• Status
• Quick Demo (Internet willing)
14. 14
Applications
•Anywhere that Spanning Tree is being used.
Take existing STP/MSTP based network and
migrate to Shortest Path Routing.
•Metro Ethernet
Light weight metro protocol, L2VPN solution simpler
than VPLS with lower capex/opex.
•Wireless backhaul
Use of L2VPN for LTE backhaul
•Data Center ..
15. 15
Application Data Center
Treat DC network as
one big L2 switch by
combining 100’s of smaller
switches in ‘non blocking’
topology – why?
• Any server anywhere.
• Any router anywhere.
• Any appliance anywhere.
• Any VM anywhere.
- Any IP address anywhere.
- Any subnet anywhere.
• Any storage anywhere.
• Minimal congestion issues.
• Total flexibility for power use
BIG L2
16. 16
Application Data Center
• Multiple shortest path routing
• inter server traffic
• Deterministic traffic flows.
• Flexible subnet – expand/shrink anywhere.
• Virtualization operates in subnet.
• Fully compatible with all 802.1
Data Center Bridging protocols & OA&M.
• Address isolation through m-in-m
• Fast recovery
• No loops
1.1.1.*
1.1.2.*
17. 17
Application Data Center (cont’d)
• Totally compatible with Vmware server functions:
• OA&M, motion, backup etc.
• Apps that sit on Vmware ‘just work’.
• Fully compatible with all load balancer etc. appliances.
• VRRP transparent (primary/stdby rtr per subnet)
or proprietary variations on same protocol.
• Compatible with emerging Inter DC overlay work or
Inter DC L2 tunnels.
18. 18
ECMP in DC – can be controlled
Can get perfect balance
down spine of a two layer
16 ECT L2 Fabric. Shown
Are all 16 SPF’s from 2<->24
16 different SPF trees
Each use different spine
as replication point.
Shown is one of the 16
SPF’s from/to node 1.
19. 19
• Challenges
• What is 802.1aq/SPB
• Applications
• How does it work
• Status
• Quick Demo (Internet willing)
Outline
20. 20
How does it work?
• From Operators Perspective
- Plug NNI’s together
- Group ports/c-vlan/s-vlan at UNIs that you
want to bridge (224 groups=‘services’ m-in-m
mode.)
- Assign an I-SID to each group..
- Use your .1ag OA&M
• Internally
- IS-IS reads box MAC, forms NNI adjacencies
- IS-IS advertises box MACs (so no config).
- IS-IS reads UNI port services and advertises.
- Computations produce FIBs that bridge service
members.
21. 21
• C-vlan/S-vlan or untagged traffic arrives at UNI
• Its encapsulated with B-SA of bridge
• Its encapsulated with I-SID configured for group
• Its encapsulated with B-VID chosen for route
• C-DA is looked up, if found B-DA is set
• C-DA not found, B-DA is multicast that says:
• Multicast to all other members of this I-SID
group from ‘me’. Or can head-end replicate
over unicast.
• C addresses to B address association
learned at UNI only.
Data Path (M-in-M mode)
22. 22
FDB (unicast M-in-M mode)
• A unique shortest path from node to all others
is computed.
• BMAC of other nodes installed in FIB pointing
to appropriate out interface.
• Above is repeated for 16+ shortest paths each
causes a different B-VID to be used.
• Symmetry is assured through special tie-
breaking logic. 16+ different tie-breaking
algorithms permit 16+ different shortest paths.
24. 24
802.1aq OAM capabilities
1. Continuity Check (CC)
a) Multicast/unidirectional
heartbeat
b) Usage: Fault detection
2. Loopback – Connectivity Check
a) Unicast bi-directional
request/response
b) Usage: Fault verification
3. Traceroute (i.e., Link trace)
a) Trace nodes in path to a
specified target node
b) Usage: Fault Isolation
4. Discovery (not specifically supported by .1ag however Y.1731 and 802.1ab
support it)
a) Service (e.g. discover all nodes supporting common service instance)
b) Network (e.g. discover all devices common to a domain)
5. Performance Monitoring (MEF10 and 12 - Y.1731 for pt-pt now extending to pt-mpt
and mpt-mpt)
a) Frame Delay, Frame Loss, Frame Delay Variation (derived)
b) Usage: Capacity planning, SLA reporting
Edge
Switch
Edge
Switch
Transit
Switch
Adapt Adapt
NNI
Link
NNI
Link
UNI
Link
UNI
Link
Link OAM
Trunk OAM
Service OAM (SID)
customer demarcs
Link OAM Link OAM
FULL SUITE OF ETHERNET OA&M AVAILABLE IN AN 802.1aq NETWORK
25. 25
Outline
• Challenges
• What is 802.1aq/SPB
• Applications
• How does it work
• Status
• Quick Demo (Internet willing)
26. 26
• DEPLOYMENTS:
• 20+ and growing. Carrier, Enterprise, DC fabric etc.
• SPBM Data path (PBB) and OA&M already wide spread use.
• INTERWORKING:
• Three Inter-working events. Will discuss latest next..
• TRIALS
• several SP trials
• BASE STANDARDS:
• IETF:
• RFC 6329.
• IEEE:
• Second sponsor ballot , expect ratification end of March.
• V2.0 STANDARDS:
• 802.1Qbp ECMP
• adds hash hop by hop ECMP and Shared Tree support.
• Shortcuts – new work adds L3VPN to routed B-MAC layer
Status
28. 28
One interesting Trial ..
Emulation of an SP core
network of > 100 nodes ,
> 400 links. Using Spirent and
5 physical switches
29. 29
Outline
• Challenges
• What is 802.1aq/SPB
• Applications
• How does it work
• Status
• Quick Demo (Internet willing)
30. 30
Demo – My Ottawa/Canada Lab
4 x real switches (S9300 series)
1 x Spirent SPB emulating 102 nodes.
2 x Host on same ISID.
100% standards compliant SPB
1 5
2
3
S9303-1
10.122.65.199
19
19
32
14
18
18
32
13
Spirent Spirent
Spirent
Spirent
1
2
3
4
20
20
2020
S9303-5
10.122.65.207
S9303-2
10.122.65.200
S9303-3
10.122.65.201
46
21
21
88-ae-1d
01-a7-3b
88-ae-1d
01-a7-65
TELNET FROM
WARSAW
31. 31
Demo – My Ottawa/Canada Lab
Basic status and adjacency
32. 32
Demo – My Ottawa/Canada Lab
Lots of nodes in the link state
EDITED
33. 33
Demo – My Ottawa/Canada Lab
1 5
2
3
S9303-1
10.122.65.199
19
19
32
14
18
18
32
13
Spirent Spirent
Spirent
Spirent
1
2
3
4
20
20
2020
S9303-5
10.122.65.207
S9303-2
10.122.65.200
S9303-3
10.122.65.201
46
21
21
88-ae-1d
01-a7-3b
88-ae-1d
01-a7-65
TELNET FROM
WARSAW
Two ECMP paths ... From S9303-1 to S9303-5
and vice versa.
34. 34
Demo – My Ottawa/Canada Lab
Unicast routes – 2 ECMP to each
EDITED
35. 35
Demo – My Ottawa/Canada Lab
Layer 2 Trace based on 802.1ag OA&M & query route –
deterministic routing
36. 36
Demo – My Ottawa/Canada Lab
1 5
2
3
S9303-1
10.122.65.199
19
19
32
14
18
18
32
13
Spirent Spirent
Spirent
Spirent
1
2
3
4
20
20
2020
S9303-5
10.122.65.207
S9303-2
10.122.65.200
S9303-3
10.122.65.201
46
21
21
88-ae-1d
01-a7-3b
88-ae-1d
01-a7-65
TELNET FROM
WARSAW
Mac-in-Mac learning.
S9303-1 knows that 88-ae-1d-01-a7-3b is local via IF/21
S9303-1 knows that 88-ae-1d-01-a7-65 is remote via S9303-5’s
MAC.
Local
Remote
37. 37
Demo – My Ottawa/Canada Lab
ISID 1000 service – two attachments showing
local cmac and remote c-mac tables.
38. 38
“IEEE 802.1aq” : www.wikipedia.org:
http://en.wikipedia.org/wiki/IEEE_802.1aq
Good overview, up to date with lots of references / tutorial videos all linked from here..
http://www.rfc-editor.org/in-notes/authors/rfc6329.txt
The IS-IS extensions draft, describes all the TLV’s contents/formats etc.
http://www.ieee802.org/1/files/private/aq-drafts/d4/802-1aq-D4-5.pdf
The IEEE document – the full document. Password protected but just email me for
userid/password.
“Shortest Path Bridging – Efficient Control of Larger Ethernet Networks” :
IEEE Communications Magazine – Oct 2010
“Provider Link State Bridging” :
IEEE Communications Magazine V46/N9– Sept 2008
References
Thank-You