Nt1310 Unit 4 Components Of Network Design

Improved Essays
There are two major components to the MPLS architecture and they are control panel and data panel. The control panel has a complex function and is used to exchange the layer 3 routing information (RIP, OSPF, EIGRP, and IGRP) and labels (Label Distribution Protocol (LDP)). The data plane is used to forward the packets based on the destination address or labels.
The routers that are capable of routing and switching in the MPLS domain are called LSR (Label Switch Routers). This routing and switching takes place on the basis of label that has been attached to the router. The first LSR that the packets encounters, where the label is attached is known as the ingress router. The last LSR that the label encounters, where the label is removed from the
…show more content…
This label attached tell the packet that the route the packet is supposed to take in the network. Label stacking is a concept where a label can be attached to e packet that already has a label. This concept is used when a packet is to be transmitted from a location A to location Z. there is a Label Switched Path (LSP) between A to Z through various LSR. But there are two routers, say D and S in the LSP and the next hop for router for D is S according to the LSP from A to Z. but actually there is another LSP in between D and S. a secong label is attached to the packet with D as the ingress node and S as the egress node. Thus the label stacking occurs between routers D and S. MPLS is capable of supporting multilevel label …show more content…
It is based on the simple technology of the label swapping paradigm. It has the capabilities to address some of the issues of traffic engineering over the IP networks. MPLS can also be combined with various technologies and can be used to address the issues related to traffic engineering. In MPLS the route that the packet is going to take is decided by the ingress router. As only one router is used to decide the route of the packet, sophisticated routing control capabilities can be introduced into the network. These paths introduced into the network are independent of the shortest route path that is designed based on the destination IP address. Due to this technique introduced fewer elements are required and the operation cost and the queuing delays are reduced. MPLS introduces the concept of traffic trunk in IP networks as one of the features for traffic engineering. In this concept the traffic belonging to a particular class is aggregated. The main issue of traffic engineering is to map the traffic on a given IP network topology. In MPLS the traffic is mapped on a given network as the route selection is made and the label switched path is

Related Documents

  • Decent Essays

    Nt1310 Unit 1 Exercise 1

    • 551 Words
    • 3 Pages

    In this section the fast-recovery algorithm that makes TCP NewReno[1] perform better than the Reno[3], is described. During congestion avoidance if the sender receives triple duplicate ACKs, then it performs fast-retransmission and enters into fast-recovery. In fast-retransmit the sender retransmits the lost segment,sets the threshold value for slow-start as ssthresh = cwnd/2, and sets congestion window, cwnd = ssthresh+3 segments. In fast-recovery, the sender increases its congestion window by one segment for each subsequent duplicate ACK received that indicates a segment is reaching the destination. It can transmit new segments if permitted by its congestion window.…

    • 551 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    In order to provide reliability and quality of service (QoS) rules or policies that prioritize packets for outbound port queue will be in implement to meet the bank management requirement. The Internet and WAN connection will use multi-protocol label…

    • 452 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Nt2580 Unit 6 Lab 1

    • 1713 Words
    • 7 Pages

    OMIS 660 Business Computing Environment and Network Lab - 1 REPORT TCP: Transmission Control Protocol SUMMARY: The idea of TCP congestion control is for each sender to determine the available capacity in the network so that it knows how many packets can be safely transmitted. The congestion window is a state variable for each connection which is used by the sender to limit how much data a sender can transmit into the network before receiving an acknowledgement. This report consist of the simulation of different model of TCP transmission which demonstrates the congestion control using the variation of dynamic window size implemented by TCP (Transmission Control Protocol). Various models are considered where packet drop rates are varied for demonstration of different situations from…

    • 1713 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    IPsec is often installed on today's IPv4 networks to protect communication over VPN networks. It is used to access VPN, as well as between VPNs. IPv6 transition mechanisms can use this kind of infrastructure to achieve a certain level of protection, even in the absence of IPv6 IPsec. Remote IPv4 hosts access private networks by establishing encrypted VPN access to a gateway device set up for this purpose. If the same host is capable of IPv6, it can break through an IPv6 tunnel over this IPv4-protected communication channel.…

    • 274 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    In the paper, [1], the author introduced two kinds of topology attacks focus on the architecture of SDN and emphasized the weakness of the host tracking service and the link discovery service. And then, the paper provides the security extension, called Topoguard, for the Floodlight v0.9 controller. A. Two topology attacks The first attack as we mentioned, Host Location Hijacking Attack, is to send a fake request that the target host migrates to a new location trying to intercept packets and connections to the target host. This attack uses the weakness of the host tracking service that the controller simply follows the latest Packet-in message and does not check the identity of the request.…

    • 647 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1 Lab 1

    • 439 Words
    • 2 Pages

    Speed, availability, and reliability are vital for a successful network infrastructure in terms of productivity and user experience. When first configuring this lab, I had to make the decision of whether or not to use one server to run all of the services or if the load should be distributed amongst multiple machines. I decided to go with the later, having a separate server hosting the wiki, another providing monitor services, and yet another acting as the DHCP, DNS and AD controller. While the last three were not required in the scope of this lab, I wanted to set up my initial network in a scalable manner, and this was the best solution for future growth. Distributing the services across multiple machines helps to reduce the processing that each box is required to do in order to fulfill requests.…

    • 439 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    We must be to create a custom network as appropriate with our thesis such as star topology or random topology or simple topology [35], by using the python script to make the network and must be to create topology like in chapter four to compare the result and throughput with other paper. 2.9.3 Design algorithm We need to get the best result and best throughput…

    • 464 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The following are the top 10 types of packets: IPv4: Internet Protocol version 4 (IPv4) is the standard version of the internet protocol, that acts as the platform for standard internet protocols and existing internet models (ISP). Extensive use of this protocol led to exhaustion of IP addresses. Therefore, we are bound to use IPv6, in the near future. A feature called as sub-netting is used for IP address allocation. It is defined in RFC 791.…

    • 917 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    In this task I will be using a diagram to outline the relationship between the layers in an interface showing each other of the points in the corresponding layer in the TCP/IP protocol suite. I will also be describing the type and functions of entities and the service they provide. A) The way communications are done between a computers on a network is through protocol suits. The most used protocol suite and commonly available protocol suite is TCP/IP protocol suite.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Paxos is theoretical achievement but not necessarily suited to build practical distributed systems. Log management is simplified in Raft while Paxos do not care about log replication. Paxos algorithm does not guarantee the progress but Raft in fact is more promising when it comes to progress. Though raft protocol is complex but it is prescriptive about the timeouts in electing a…

    • 959 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 3 Assignment

    • 867 Words
    • 4 Pages

    The web pages, the content and the web servers, this is the technology that helps the World Wide Web and helps store and manage the internet and the web content. D1: Role of TCP/IP protocol, linking with Application Layer protocol: TCP/IP stands for (Transmission Control Protocol/Internet Protocol); this is part of the Internet Protocol Suite. The role of TCP/IP is to make sure the data that it is receiving is been delivered to the right address, they are a combination of instructions that outline packages of information sent to the user. The TCP/IP contains different protocols HTTP , FTP , SMTP , DNS , RIP and SNMP .…

    • 867 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Many companies often use VPNs to communicate across multiple locations for both extranets…

    • 638 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The Transfer Control Protocol (TCP) and High-Level Data Link Control (HDLC) ensure the reliability of data. They ensure that data transfers from one node to the other without any error. Moreover, the data is transferred between the network nodes in the form of packets. These packets are not sent in any particular order; therefore, TCP and HDLC are also required in order to ensure the sequencing of data. Automatic Repeat Request or ARQs also help in detecting errors in…

    • 380 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    This paper describes about the notion of Free Wi-Fi in New York City, which is called LinkNYC and elaborates the system in terms of its network configuration. The network diagram will be provided to illustrate the overall system. Moreover, identifying the cost associates in this project. Most important, expounding how this system could affect towards marketing for smartphone users. Introduction…

    • 1026 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    As computers became essential to business, industry, trades, and professions, educators and parents became increasingly concerned that young people acquire at minimum the basic understanding of computers and master the related skills. 2. Explain computer algorithms and its significance An algorithm is a set of instructions designed to perform a specific task. In computer science, an algorithm is a set of steps for a computer application to accomplish a task.…

    • 790 Words
    • 4 Pages
    Improved Essays