Preview

Mpls

Powerful Essays
Open Document
Open Document
1876 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Mpls
Abstract: This paper mainly discusses the outline of the MPLS VPN Layer 3. The information is about the MPLS introduction, VPN, MPLS VPN, Working, VRN Routing Information and BGP distribution. Disadvantages and future security recommendations are also mentioned in the report.

Introduction
Why MPLS?
Now a day’s technology is increasing rapidly. Every present technology has been further extended into new future technology. MPLS is mainly introduced to overcome the drawbacks of traditional IP Routing. For distributing Layer 3 routing data different routing protocols are used. Forwarding the packets is based on the destination address. So routing lookups are performed on every node that the packet is forwarded along the path. This routing lookup on each node is a time consuming process. Every router should have the total internet routing information which contains millions of routes.
So some requirements are aroused and need to develop a new technology which should satisfy some features. 1. Single infrastructure which supports multiple applications with protection 2. High scalability mechanism i.e. it should be topology driven rather than flow driven 3. Load Balancing traffic 4. Effective usage of network Bandwidth. 5. Simple forwarding paradigm 6. Low usage of Bandwidth.

MPLS: Every client requires more, faster and better technology to run multiple applications with fewer things. Now MPLS came into picture. This technology is implemented with minimizing delay and packet loss. It is a technology for delivering the IP services. It switches the packets rather than routing the packets to transport the data to destination. The name itself says that it uses the labels for switching the packets. Packets can run on other layer 2 technologies such as ATM, Frame Relay, PPP (Point to Point Protocol). ATM relies on PVCs i.e. it depends on VPI/VCI values, Frame relay depends on VLCI values transferring the packets from A to B within the



References: [1] http://www.cisco.com/en/US/docs/ios/mpls/configuration/guide/mp_cfg_layer3_vpn.html#wp1051456 [2] http://www.cisco.com/en/US/prod/collateral/routers/ps9343/Deploying_and_Configuring_MPLS_Virtual_Private_Networks_In_IP_Tunnel_Environment.pdf [3] http://www.cisco.com/en/US/docs/routers/crs/software/crs_r4.1/lxvpn/configuration/guide/vc41v3.pdf

You May Also Find These Documents Helpful

  • Powerful Essays

    It230 Unit 3 Assignment 1

    • 5629 Words
    • 23 Pages

    General assessment of the selected routing protocol identify its functionality and how an algorithm should be developed to the specific routing protocol.…

    • 5629 Words
    • 23 Pages
    Powerful Essays
  • Satisfactory Essays

    Cookies Are Us Case Study

    • 436 Words
    • 2 Pages

    | Capability to support the existing and newer services with the existing hardware via software upgrades…

    • 436 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    technology initiative described above; how it will be planned for; and when changes will be…

    • 2750 Words
    • 15 Pages
    Powerful Essays
  • Satisfactory Essays

    The project will be outsourced one preliminary company suggest that their technology will “decrease the organizations time, money expense and other valuable resources” (www.Altierre.com).…

    • 443 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Detailed Lab Step Answers

    • 2810 Words
    • 12 Pages

    VLSM greatly improves both the flexibility and the efficiency of subnetting. In order to use it, routers that support VLSM-capable routing protocols must be employed. VLSM also requires more care in how routing tables are constructed to ensure that there is no ambiguity in how to interpret an address in the network.…

    • 2810 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Corporations and small businesses alike utilize VPNs to ensure safe, secure, and reliable connections for employees and anyone else requiring access to their information system. A VPN almost creates its own little universe, or even a “VIP only” party; only invited guests may enter. Each machine: computer, router, modem, filter, and server; has dedication means of transportation for information and communication. In…

    • 735 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    There are always many factors that will impact the VPN server performance and stability. There is never a one size fits all solutions to any problem. There are many pros and cons that need to be considered. Two performance factors are the load balancing and software configuration. (Jain, S., 2006) While two stability factors are computer programs/equipment and location. (randomwire.com, 2010)…

    • 390 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Its 405 Module 3

    • 1571 Words
    • 7 Pages

    Most industries rely on the Internet and have seen significant gains in production and operations from this technology. Suppliers, customers, vendors, etc. use the Internet for orders, supply tracking, etc. The internet now plays a crucial role in most companies operations. While IPv4 has worked well for us for many years, the problem now lies…

    • 1571 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    631 research paper

    • 1926 Words
    • 7 Pages

    New developments in the field of remote connections are enlarging day by day for easy and fast recovery from disaster plus the effective cost. Our Research paper provides details on point-to-point tunneling protocol (PPTP). PPTP is used in remote connections and VPN connections. Organizations can use internet securely with PPTP and this type of connection is VPN. PPTP is very simple for implementation from end users perspective. PPTP needs basic encryption and so it is faster. PPTP supports multiprotocol communication. PPTP is very simple for implementation from end users perspective. It satisfies users from cost perspective along with technical satisfaction.…

    • 1926 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Our primary focus with this paper was to research and assess the issues associated with the specific emerging technology.…

    • 7281 Words
    • 30 Pages
    Good Essays
  • Good Essays

    in which the technology will be utilized” (Karahanna et al., 2006, p. 782). Diverse studies…

    • 1503 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    MPLS

    • 1836 Words
    • 9 Pages

    individual nodes and links can be configured and monitored within the context of a complete endto-end topology. Cisco MPLS Tunnel Builder integrates the configuration of the different Cisco…

    • 1836 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    MPLS intro from cicso

    • 23391 Words
    • 94 Pages

    Specifically, MPLS can efficiently enable the delivery of IP services over an ATM switched network.…

    • 23391 Words
    • 94 Pages
    Powerful Essays
  • Powerful Essays

    Zone Routing Protocol

    • 7787 Words
    • 32 Pages

    Zone Routing Protocol in Computer Networking (ZRP) Abstract Routing protocols for mobile ad-hoc networks have to face the challenge of frequently changing topology, low transmission power and asymmetric links. Both proactive and reactive routing protocols prove to be inefficient under these circumstances. The Zone Routing Protocol (ZRP) combines the advantages of the proactive and reactive approaches by maintaining an up-to-date topological map of a zone centered on each node.…

    • 7787 Words
    • 32 Pages
    Powerful Essays
  • Powerful Essays

    Online Reesrvation

    • 2453 Words
    • 10 Pages

    The proponents gathered materials in order to get some ideas and information that will serve as a reference to their study. All these information helped the researcher in solving out the problems and arrived to a proposal of a new system.…

    • 2453 Words
    • 10 Pages
    Powerful Essays