Instituto Tecnológico de las Américas

Nombre: Hugo A. Sanchez

Matricula: 2007-0012

Materia: Tecnologias WAN (CCNA 4)

Profesor(a): Wendy de la Rosa

did not achieve market dominance. since for a significant length of time it was impossible to forward IP packets entirely in hardware. not restricted to ATM transmission. introduced a related proposal. The primary benefit is to eliminate dependence on a particular data link layer technology. It was designed to provide a unified data-carrying service for both circuit-based clients and packetswitching clients which provide a datagram service model. Frame Relay. and thus is often referred to as a "layer 2. which was defined only to work over ATM. This allows one to create end-to-end circuits across any type of transport medium. and eliminate the need for multiple layer2 networks to satisfy different types of traffic. protocol agnostic. data-carrying mechanism. and Ethernet frames. Cisco Systems. and development of a consensus protocol that combined features from several vendors' work. One original motivation was to allow the creation of simple high-speed switches. including IP packets. It can encapsulate packets of various network protocols. In an MPLS network. Therefore the advantages of MPLS primarily revolve around the ability to support multiple service models and perform traffic management. .Multiprotocol Label Switching In 1996 a group from Ipsilon Networks proposed a "flow management protocol". data packets are assigned labels. It was handed over to the Internet Engineering Task Force (IETF) for open standardization. The IETF work involved proposals from other vendors. MPLS makes it easy to create virtual links between distant nodes. It can be used to carry many different kinds of traffic. Multiprotocol Label Switching (MPLS) is a mechanism in high-performance telecommunications networks which directs and carries data from one network node to the next with the help of labels. called "Tag Switching". MPLS operates at an OSI model layer that is generally considered to lie between traditional definitions of layer 2 (data link layer) and layer 3 (network layer). However. advances in VLSI have made such devices possible. without the need to examine the packet itself. MPLS also offers a robust recovery framework that goes beyond the simple protection rings of synchronous optical networking (SONET/SDH). SONET. Packet-forwarding decisions are made solely on the contents of this label. Their "IP Switching" technology. and was renamed "Label Switching". MPLS belongs to the family of packet-switched networks. using any protocol.5" protocol. as well as native ATM. such as Asynchronous Transfer Mode (ATM). MPLS is a highly scalable.[4] It was a Cisco proprietary proposal. Synchronous Optical Networking (SONET) or Ethernet.

a 3-bit Traffic Class field for QoS (quality of service) priority (experimental) and ECN (Explicit Congestion Notification). At the same time. Many network engineers agree that ATM should be replaced with a protocol that requires less overhead. an 8-bit TTL (time to live) field. thus aligning these technologies with current and future technology needs. MPLS technologies have evolved with the strengths and weaknesses of ATM in mind. respectively. MPLS attempts to preserve the traffic engineering and out-of-band control that made frame relay and ATM attractive for deploying large-scale networks. In particular. . under penultimate hop popping this function may instead be performed by the LSR directly connected to the LER.   These MPLS-labeled packets are switched after a label lookup/switch instead of a lookup into the IP table. push an MPLS label onto an incoming packet[note 1] and pop it off the outgoing packet. Each label stack entry contains four fields:   A 20-bit label value. such as Frame Relay and ATM. which.g. MPLS is currently replacing some of these technologies in the marketplace. there is a significant loss of visibility and access into the MPLS cloud for IT departments MPLS works by prefixing packets with an MPLS header. containing one or more labels. While the traffic management benefits of migrating to MPLS are quite valuable (better reliability. MPLS recognizes that small ATM cells are not needed in the core of modern networks. label lookup and label switching were faster than a routing table or RIB (Routing Information Base) lookup because they could take place directly within the switched fabric and not the CPU. Routers that perform routing based only on the label are called label switch routers (LSRs). It is highly possible that MPLS will completely replace these technologies in the future. while providing connection-oriented services for variable-length frames. Alternatively. to support voice traffic — was the motivation for the cell nature of ATM). This is called a label stack. it signifies that the current label is the last in the stack. MPLS dispenses with the cell-switching and signaling-protocol baggage of ATM. If this is set. increased performance). The entry and exit points of an MPLS network are called label edge routers (LERs). a 1-bit bottom of stack flag. As mentioned above. since modern optical networks (as of 2008) are so fast (at 40 Gbit/s and beyond) that even full-length 1500 byte packets do not incur significant real-time queuing delays (the need to reduce such delays — e. when MPLS was conceived..A number of different technologies were previously deployed with essentially identical goals.

due to the prevalent use of Ethernet in corporate and. Ethernet on the MAN can be used as pure Ethernet. more recently. there exist extensions of the BGP protocol that can be used to manage an MPLS path. Metro Ethernet A Metro Ethernet is a computer network that covers a metropolitan area and that is based on the Ethernet standard. Ethernet over MPLS or Ethernet over DWDM. If one wants to carry two different types of traffic between the same two routers. SDH-based deployments are useful when there is an existing SDH infrastructure already in place. . bringing Ethernet in to the Metropolitan Area Network (MAN) introduces a lot of advantages to both the service provider and the customer (corporate and residential). 40Gbit/s or 100Gbit/s speeds. distribution (aggregation) and access. Furthermore. residential networks. hub-andspoke (star). and are typically used by large service providers. Ethernet over SDH. its main shortcoming being the loss of flexibility in bandwidth management due to the rigid hierarchy imposed by the SDH network. with different treatment by the core routers for each type. but may migrate to newer forms of Ethernet Transport in the form of 10Gbit/s. MPLS based deployments are costly but highly reliable and scalable. Ethernet also supports high bandwidths with fine granularity. Another distinct advantage of an Ethernet-based access network is that it can be easily connected to the customer network.There are two standardized protocols for managing MPLS paths: the Label Distribution Protocol (LDP) and RSVP-TE. or full or partial mesh. Ethernet has been a well known technology for decades. an extension of the Resource Reservation Protocol (RSVP) for traffic engineering. An MPLS header does not identify the type of data carried inside the MPLS path. The topology could be a ring. Pure Ethernet-based deployments are cheap but less reliable and scalable.[clarification needed] which is not available with traditional SDH connections. It is commonly used as a metropolitan access network to connect subscribers and businesses to a larger service network or the Internet. The network will also have a hierarchy: core. Businesses can also use Metro Ethernet to connect branch offices to their Intranet. and thus are usually limited to small scale or experimental deployments. An Ethernet interface is much less expensive than a SONET/SDH or PDH interface of the same bandwidth. one has to establish a separate MPLS path for each type of traffic. The core in most cases is an existing IP/MPLS backbone. A typical service provider Metro Ethernet network is a collection of Layer 2 or/and Layer 3 switches or/and routers connected through optical fiber. Therefore.

and may include ONT and/or Residential gateway. MAC traceroute.  Multiprotocol convergence: with the maturity on pseudowires standards (ATM Virtual Leased Line VLL. each switched path can have 4094 single tag VLANs. and Maintenance) is a protocol for installing. ATM aggregation for UMTS or TDM aggregation for GSM).  End to End OAM: MPLS-based MAN offers a wide set of troubleshooting and OAM MPLS-based tools which enrich Service Providers ability to effectively troubleshoot and diagnose network problems. MAC ping.1s MSTP (30 to sub 50ms sec convergence depending on network design) while MPLS-based MANs use mechanisms such as MPLS Fast Reroute to achieve SDH-like (50 msecs) convergence times. LSP ping etc. EOAM (Ethernet Operations.) an MPLS-based Metro Ethernet can backhaul IP/Ethernet traffic together with virtually any type of traffic coming from customer or other access networks (i. IEEE 802. Aggregation/Distribution. This is the network that connects customer equipment. while this could be more challenging in a pure Ethernet scenario. When using MPLS. Ethernet VLANs have local meaning only (like Frame Relay PVC). IEEE 802. FR VLL. and troubleshooting MANs and WANs.A comparison of MPLS-based Metro Ethernet against a pure Ethernet MAN:  Scalability: In a properly designed Ethernet VLAN network.[1]  Access devices normally exist at a customer's premises. although this issue can be managed by smart network design and choosing switches with MAC tables sufficient for the size of network segments. . unit. These include for example. etc.e.  Resiliency: pure Ethernet network resiliency relies on Spanning Tree Protocols STP.1w RSTP or IEEE 802. Metro. but this convergence time may vary from vendor to vendor. However there are now Ethernet OAM tools defined in IEEE 802. or wireless base station. and Core. Administration.1ab]]. monitoring. end segments and rings of single tag devices can receive only the traffic that they need. Some aggregation and core switches can classify traffic by two VLANs using IEEE 802. or office router. so with such aggregation devices properly placed in the center of a network.8031). Familiar network domains are likely to exist regardless of the transport technology chosen to implement Metro Area Networks: Access. Same scalability considerations apply to the MAC addresses where in a pure Layer 2 Ethernet MAN all MAC addresses are being shared across the network. Metro Ethernet can also utilise Link aggregation or Resilient Packet Ring where appropriate to add link redundancy and recovery in distribution networks. Ethernet protection switching is also standardised in (ITU G. Some Ethernet vendors' RSTP convergence is also sub-50ms.3ah[3]) for monitoring and troubleshooting Ethernet networks.1ad VLAN stacking.1ag[2] andEthernet in the First Mile (IEEE 802.

it became possible to isolate the customers' traffic from each other and from the core network internal signaling traffic. and also for a relatively simple initial configuration. Logical differentiation of the physical network helps to identify the rights that the traffic has and to ease the management of hosts' access rights with respect to other users and networks. This part of the network includes nodes such as Multi Tenanted Unit switches. Aggregation occurs on a distribution network such as an ODN segment. However. it was impossible to keep traffic isolated.1Qay (Provider Backbone Transport) (also known as PBT or PBB-TE).1ah (Provider Backbone Bridges) (also known as MAC in MAC or PBB) and IEEE 802. This allows for a very simple and cheap design. Spanning-tree. and VLAN Translation. Optical line terminals in an outside plant or central officecabinet. A Core Network often uses IP-MPLS to connect different Metro networks together. The original Ethernet technology was not well suited for service provider applications. A Metro Area Network may include transport technologies MPLS.1ad (Provider Bridges)(also known as QinQ or stacked VLANs) and IEEE 802. Ethernet MANs became feasible in the late 90s due to the development of new techniques to allow transparent tunneling of traffic through the use of Virtual LANs as "point to point" or "multipoint to multipoint" circuits. Ethernet is constantly evolving and has now carrier class features with the recent addition of IEEE 802. PBB-TE and T-MPLS. broadcast packets and dynamic MAC learning are disabled and sub 50ms failover features are introduced.   Much of the functionality of Metro Ethernet such as Virtual Private Line or Virtual Private LAN is implemented by the use of Ethernet VLAN tags that allow differentiation of each part of the network. Ethernet in the First Mile equipment. or provider bridges. . which made implementation of private circuits impossible. but some using point-to-point Ethernet over "home-run" direct fibre. Often Passive Optical Network or Digital Subscriber Line technologies are employed. A pure Ethernet MAN uses only layer 2 switches for all of its internal structure. as a shared-media network. Combined with new features such as VLAN Stacking (also known as VLAN Tunneling). each with its own resiliency and management solutions.

3970.70 8.:0  .1907. ..0397. -9-499424189.3.7089.0 57479 05072039.990.. 9206:0:3/0.0330073.11.:.  .-0..11.70.-044:5.11.0/.0 10/  %080!$ .3948841. ....02039-0301984127.  -9./0.098/4349 3.3 -9%% 92094..08839490!$.997..20920 !$.9394!$.0309478  09097.94314790.8810/147"4$ 6:....3814:710/8     0  948:55479.... 1988809 9831089.-08 %88.7920398 !$478-570135...3/-043/ 9../0 17.3/.:7831..2070.2.3/4:9 41 -.4:/147% /05.943  ..-0 -0990770.990259894570807./07 .706:90.0 90708.3/ 5..439749.33430472470.031: 039 -905.09097.9 4308943491.8-9..4.439..:77039.439.3. -9%7.80/5071472.831.92.0/.9.0989.-089..941807.097.3!$0.890249.-00/5.0147/0543.8 .-0890.8 90300/9470/:.03.8939089.9:7041%  9908.11.1.08:.3/.3/%. ..-9

.9507147274:93-.- 44:5-0.4:/9.-7./-050714720/-90$#/70..4235.093490(.90 4554553981:3.30701.3890.0 03!$. 70850.0/..-4./41.70.74:9078 $#8 %00397.0 5:8.-044:5..4330.3!$30947.3/.9.89.0/70.74:939.0/.3/5459411904:9435.3 .9432.-047# #4:9331472.-04394.33..0/1.05.80/434390.3!$ ..9.44:539490! 9.:8090.3/34990!&  #4:90789.9.3890.-0.0/ .89079.0 :3/07503:92.-089.-0 82039430/.90/9490#  .943.-00/074:9078 #8 .43.70.993 9089.09 9073..3/ 095439841.

4330.47074:9078 1470.3.309038434190#084:7.9504197.4330.-09003908.98-.0 9.3..9 1430.3.98:-8.0#0807.   .  °   09749073098..082:..49.3-0:80/942.20974549..481472.91470..80/43 9090730989.77 94/110703995084197.3.0894907397.11..!7494.90!$5.3!$5.-0897-:943!7494.9 -7.03094747903907309 :8308808.078..7/0/57494..8-003.425:907309479..3/9.4 #$'! 14797.%070./08 390730939071.70./07/408349/03919095041/.3/#$'! % .805.770/38/090!$5.7.42243:80/..8.0.20974549.92039-90.3/.84:80097490730994.209474:9078 9/1107039970.707807.894089.0883094794.$ %...3/.034390..9.3. 0330073 :79072470 9070089090384384190!57494.9  3!$0.709489..08805038.39894.7/ 98.950 430.3 !$5.4 !  .9890.-8.411.3.309  907309.7-078..3.9.3/ -:830880894.4.

0574.309478  %0701470 -733907309394900974549..0747.039 708/039.99...0574...   95.0947  3974/:./.4941.47547.8.041908.807.3//98 91307.4330.79 .90/9490./070974907309309478.$47!39071.-0997.$.3//9 907309.8349.039:80419073093..3/ 247070.041./.39.20-..3:.3/708/039..370..9438 34907 /893../ -.71.:894207 ./943.0883094789.3/90.90.4330..:894207 30947 /:09490570..90.943300/0/(.94341..08 94-4990807...80/.47547.3-00..848:554798-.

.0847.07 89.3/.

.47032489.3/ 8540 89.1-07 %094544.0.84..4330..088 %0.7 471:475.943 .70..3/.470 /897-:943 ..3/74:9078..8088.4:/-0.73 :- .07.7.208 %030947.30893!.90/974:459.79..

385479390147241 -9.27.-430 -:92.!$-.9094 30071472841907309%7..

8  -9.

847 -9.

.9:70.5-:908870.-0 ./05420398 $ -.3/..3//92..3.423-03904884110-9 3-...0 982.3/8.70.02039/:094907/07.07!$47907309 4.70807.70.7..897:.-0.0574.-0 .290/9482.70:801:03 90708.04705072039.70 :8:.80//05420398.3/8.80/ /05420398.:80/-.88500/8  9073094390.3-0:80/.85:70907309 9073094.7095..8.38479..70.07$ 9073094.3/9:8./35.0.07 !:70907309 -..489-:970./078  .25480/-90$30947 !$-.30893$317.80//05420398.-0.

:!..80/0974907309.70/.04..3-.4.03/47  90730957490.3/738418309. .88197.89#074:9094.085745075.0  8309.20.03/4794.30947 03/8020398...0/5.7/80/3 %&     :957494.848:-  28 -:998..8  ..3-02.03907 41.80/0974907309.0703..48$%!    #$%!47  8$%!  948:- 2880.47089.5:70907309  $..3....0703.09902.09202.943/0.0/-82...0.09208 0974907309.94:9888:0.9.09#3070 ..990300/  03:83!$ 907309'8.0703.3/.700843$5.43.94347#08039!...43.08.9438.574507/0830/907309'30947 0.0/390..333%700!7494.70..//708808.  #$%!..5:70.438/07.557457..0439097..80/ 30' #' 09.20 8.389..0.08.3343 07.073/897-:943309478 $420907309..-088:11.80/8:8020.559490.79 30947/083..8489.38288:.0/0503/34330947/083 0 !$ -..3.0703./'89.448389...039147908041309478020398   #0803.94389.70.370.0899.3 8498:..74889030947 ./ %'79:.. .84:9803.11.784341!$ -.11.70.-9.70-038.//370/:3/.3/70.-94'8 :83  ..8!$.3!$ -.5:709073093094770803..20#0.89.'8 $420.$ 0  280.3/.943.425.71742.-93.!' $.9094.4.0703.07907309.

9.074:90 $!5309.70.0974:-08449.3/.943 .250 53 97./080941974:-084493.90730997.38547990.(.4147389..09478.80/411078.80/ 9448.348030947 574-028 %0803.3.088309478  0 % .:/01470.3/ !$ -.3/907309390789 0   .943147$ 098.39504197.70 34907309 9448/0130/3  .03.3 2439473 .9438 /23897.730947/42.0 8.480394 2502039097470.943..57494.3/ 974:-0844938.4:/-02470.79:.0!74.3/8   .344.4231742.$07.38..( 1472439473. 40..3/974:-084493907309309478   907309 507.3//.11.940907 9.70./078.. 5:709073098.2.3903..088 70.-9940110.74   3/943/ !$ -.037.:894207474907..-((   .943147&%$47%.11.079070.0333..7009408970.7/088419097.

:89420706:52039 .8089.9.3/.4330.9.088/0.897-:943 0974 .089..98.943 %88 90309479.3.:/0 %.3/470 (  .083472.3/2..:894207 85702808 :39 4770088-..

 .47#08/039.074:907  .90. 47411.

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

Sign up to vote on this title
UsefulNot useful