This website uses cookies to ensure you have the best experience. Learn more

Multiprotocol Label Switching (Mpls) Essay

1579 words - 7 pages

Introduction

In computer networking and telecommunications, Multi Protocol Label Switching (MPLS) is a data-carrying mechanism that belongs to the family of packet-switched networks.

When it comes to getting network traffic from point A to point B, no single way suits every application. Voice and video applications require minimum delay variation, while mission-critical applications require hard guarantees-of-service and rerouting.

So far, only circuit-switched networks have provided the differentiated services and guarantees required by many of these applications. But a new technology called Multiprotocol Label Switching (MPLS) is changing all that. With MPLS, you can support all ...view middle of the document...

The IETF work involved proposals from other vendors, and development of a consensus protocol that combined features from several vendors' work.

One original motivation was to allow the creation of simple high-speed switches, since for a significant length of time it was impossible to forward IP packets entirely in hardware. However, advances in VLSI have made such devices possible. Therefore the advantages of MPLS primarily revolve around the ability to support multiple service models and perform traffic management. MPLS also offers a robust recovery framework that goes beyond the simple protection rings of synchronous optical networking (SONET/SDH).

While the traffic management benefits of migrating to MPLS are quite valuable (better reliability, increased performance), there is a significant loss of visibility and access into the MPLS cloud for IT departments.
How MPSL Works

MPLS works by prefixing packets with an MPLS header, containing one or more 'labels'. This is called a label stack.

Each label stack entry contains four fields:

• a 20-bit label value.
• a 3-bit field for QoS (Quality of Service) priority (experimental).
• a 1-bit bottom of stack flag. If this is set, it signifies that the current label is the last in the stack.
• an 8-bit TTL (time to live) field.

A label is a short, four-byte, fixed-length, locally-significant identifier which is used to identify a Forwarding Equivalence Class (FEC). The label which is put on a particular packet represents the FEC to which that packet is assigned.

• Label—Label Value (Unstructured), 20 bits
• Exp—Experimental Use, 3 bits; currently used as a Class of Service (CoS) field.
• S—Bottom of Stack, 1 bit
• TTL—Time to Live, 8 bits

The label is imposed between the data link layer (Layer 2) header and network layer (Layer 3) header. The top of the label stack appears first in the packet, and the bottom appears last. The network layer packet immediately follows the last label in the label stack.

Traditional IP forwarding techniques analyze the destination IP address contained in the network layer header for every packet at each hop in the network. This process is called hop-by-hop destination-based routing. The route that packets take is based solely on the destination unicast address. Layer 3 routing protocols do not traditionally have any interaction with Layer 2 network characteristics, making the implementation of Quality of Service (QOS) and loading features difficult.
Multiprotocol Label Switching (MPLS) is a vendor-independent protocol (based on Cisco's tag-switching protocol) that applies labels to packets providing QOS and advance route selection functions.
MPSL Implementation

There are several terms used in MPLS implementations.

Label
Header applied to a packet by an edge label switch router (edge LSR) and used by label switch routers (LSR) to forward packets.

Label forwarding information base (LFIB)
Table that indicates...

Other Papers Like Multiprotocol Label Switching (MPLS)

Capstone Part 2 Essay

4410 words - 18 pages recommended software for data, email and file sharing. MPLS (Multiprotocol Label Switching) will be used for streaming audio and Streaming video. VMware will also be supported to accommodate contractors need with a virtual machine for file sharing and email. From a security standpoint, this will eliminate the possibility of corrupting the main network. Washington Site Equipment and Hardware To connect the offices to each other the branch

Business Review

5388 words - 22 pages CML3 Client Managed Layer 3 VPN WAN Access Service CPE Customer Premise Equipment IP Internet protocol MPLS Multi Protocol Label Switching PE Provider Edge Router PPP Point-to-point Protocol PSTN Public switched telephone network QoS Quality of service RE Routed Edge TCP Transmission Control Protocol TML3 TELUS Managed WAN Layer 3 VPN WAN Access VPN Virtual Private Network VRF Virtual Routing & Forwarding WAN Wide Area Network 80 Glossary

Customer Relationship Management in Indosat

4806 words - 20 pages Private Leased Circuit) & DPLC (Domestic Private Leased Circuit), service connection point to point circuit  Frame Relay & ATM (Asynchronous Transfer Mode), flexibility of data transmission is bursty  INP (Internet Network Provider), the global internet access  IDIA (Indosat Dedicated Internet Access), create a private network through the packet data  INIX (Indosat National Internet Exchange) for mobile  MPLS (Multi-Protocol Label

Freedom And Responsibility

2141 words - 9 pages Built within the Constitution of the United States are specifically defined freedoms that are guaranteed to all citizens. Conversely, with every constitutional freedom there comes a corresponding responsibility. On September 25, 1789, the state legislature’s twelve proposed amendments were transmitted by congress, the first two dealing with congressional representation and congressional pay. The following numbers three through twelve were

Hate Crime Laws

2348 words - 10 pages On June 7, 1998, 49-year-old James Byrd Jr. of Texas accepted a ride from three white men, who then beat him severely, urinated on him, chained him by his ankles to the back of their pick-up truck, dragged him for three miles into the countryside, and dumped his corpse in front of an African-American cemetery (Graczyk). A little over a year later, a jury sentenced ring leader John King to death by lethal injection (“Man Executed for Dragging

Rational Emotional Behavior Therapy Case Study Conceptualization And Treatment Plan

2140 words - 9 pages Rational Emotional Behavior Therapy Case Study of Sarah: A Conceptualization and Treatment Plan Rational emotive behavior therapy, REBT, was developed by Albert Ellis and holds the central belief that the events in our lives do not cause our disturbances but that they are instead caused by our view of the events (Murdock, 2009). Murdock (2009) states that “people are seen as responsible for their behavior” (p. 279) but, because they are

Holidays In Albania

1636 words - 7 pages Have you ever thought about having exciting and incredibly cheap vacations? Albania might be the right choice. According to My Travel Guide, Albania is ranked the fourth among ten places worth visiting in Eastern Europe (“Top 10 Eastern European Destinations”). One can encounter three kinds of vacations in this Mediterranean country: winter, summer, and cultural. The ideal places to spend your winter vacations are the Albanian Alps. They are

A Heart Of Darkness

1748 words - 7 pages In this short story, there are frequent significant subject and ideas that make the story, "A Heart of Darkness," by Joseph Conrad, and haunting novel. The main theme is absolute white power over the natives. The theme validates the corruption, and the dependence caused by the white people as they took over the Congo. White men were giving all the power; they had no self-control, and in the end they did not use wisely. The white men became

The Aspects Of Vulnerability Among The Exploited In Medical Research

2287 words - 10 pages Essentially, everyone is in some state of vulnerability. However, some of us are more susceptible to harm due to our vulnerabilities. The susceptible are the individuals with the greatest risk. These individuals risk the loss of their autonomy, and maybe even their lives. Vulnerable populations can be found in every subset of society. However, as previously mentioned, there are some vulnerable populations that are at an even greater risk than

The Hitchhiker’S Guide To The Galaxy

1171 words - 5 pages The Hitchhiker’s Guide to the Galaxy As the human race makes life-changing discoveries, it is made apparent that there is always more to learn as the universe, instead of becoming familiar, is becoming absurd. The Hitchhiker’s Guide to the Galaxy, written by Douglas Adams, as well as the 2005 film adaption, portrays absurdity to be an all-encompassing system in the universe. Through the introduction and attempt to understand lack of reason, the

The Ford Motor Company Wage Increase Of 1914 And The Theory Of Incentives And Efficiency Wages

1252 words - 6 pages ‘It’s not the employer who pays the wages. Employers only handle the money. It is the customer who pays the wages’ (Henry Ford, cited in Johnson and Weinstein 2004, p. 2). When the Ford Motor Company announced that it would more than double the wages of its workers in January 1914 to a ‘five-dollar day’ minimum, was this a contradiction to Henry Ford’s statement? If customers are actually the ultimate payers of wages, then more than

Related Essays

Public Speaking Essay

659 words - 3 pages options, such as connections: a) Over satellite directly to the public Internet. b) Through a virtual private network (VPN) that connects securely and cost-effectively to your corporate network using the Internet. c) Via multiprotocol label switching (MPLS) circuit or leased line from the satellite hub to your headquarters, avoiding the public Internet. Our Rapid Site Setup provides your organization with a broadband Internet connection at

Kelly Services Essay

1065 words - 5 pages -based services, including wireless data, business video, data and voice services, private line and wavelength traffic, as well as IP-based residential services and Internet access for more than 16.4 million broadband customers. The AT&T network also incorporates Multiprotocol Label Switching (MPLS), which supports a full range of applications over a single IP network infrastructure with the highest levels of service quality” (AT&T, 2013

At&T Description Essay

3686 words - 15 pages global backbone network carries 28.9 petabytes of data traffic on an average business day. Our backbone network carries a full range of IP-based services, including wireless data, business video, data and voice services, private line and wavelength traffic, as well as IP-based residential services and Internet access for AT&T's more than 17.8 million total broadband customers. Our network also incorporates Multiprotocol Label Switching (MPLS

Project Management Techniques Essay

3286 words - 14 pages 25th, 2011 | | Word Count - 4258 Question 1. Project Background The MTN Nigeria Multi-Protocol Label Switching (MPLS) Network is an important initiative in MTN Nigeria network today. It was built to deliver multimedia voice, video and data in