SlideShare a Scribd company logo
1 of 31
By
Jagtar Singh Dhaliwal
 RCS Global Limited is an emerging in software
business solution & IT infrastructure. With the motto
of “Provide Quality Solution at the Right Price at the
Right time”.
 The company is redefining the concepts of IT
services and consulting.
 RCS Global is the sister concern of ‘RAMA Group’
founded in 1992.
 Product Realization - Excellent team work & services.
 Business Process Consulting – Total satisfaction of client.
 IT Implementation – Focus on core business.
 Database Design – Store huge DB i.e. secure & robust.
 Business Intelligent – Expertise Troubleshoot.
 Offshore Development Centre – preparing efficient &
. reliable team.
 MEDI-SUITE
 EDU-SUITE
 SAP
 .NET
 RAMCO
 Straight Cable- Switch to router
Switch to PC or server
Hub to PC or server
 Cross Cable- Switch to switch
Switch to hub
Hub to hub
Router to router
PC to PC
Router to PC
 IP is an address of a Computer on a network.
 task of delivering datagrams from the source host to the destination host
solely based on the addresses.
 Two IP version-IPv4 and IPv6
 IPv4(Internet Protocol version 4)for 32 bits
 IPv6(Internet Protocol version6)for 128 bits
 Type of IP Address
 Static IP Address (Automatically assign)
 Dynamic IP Address (Manually assign)
 There are five classes available in IP range
 Class A- 1.0.0.1 to 126.255.255.254
 Class B- 128.1.0.1 to 191.255.255.254
 Class C- 192.1.0.1 to 223.255.255.254
 Class D- 224.1.0.1 to 239.255.255.254
 Class E- 240.1.0.1 to 254.255.255.254
Range 127.0.0.1 is reserved for loopback
 Class A- assign large number of hosts
 Class B- assign large to medium network
 Class C- used in small LAN configuration
 Class D- reserved for multicasting purposes
 Class E- for research and developing centre
 With the rapid growth of the internet & the ever-
increasing demand for new addresses, the standard
address class structure has been expanded by
borrowing bits from the Host portion to allow for
more Networks.
 There are default standard subnet masks for Class A,
B and C addresses:
 The PING (Packet Internet Groper) command
verifies OSI Layer 3 (Network Layer) connectivity.
 The subnet mask is the same for all users on a
specific network.
 Internet routing devices traditionally have been called
gateways
A network gateway is an internetworking system capable of joining
together two networks that use different base protocols.
 A choke point of control and monitoring .
 Interconnects networks with differing trust.
 Imposes restrictions on network services.
 only authorized traffic is allowed
 Improve network security & reduce risks to hosts
Characterized by protocol level it controls in
 Packet filtering (filter incoming & outgoing data)
 Circuit gateways (large network filter)
 Application gateways (Need separate proxies for each service)
 Combination of above is dynamic packet filter
 Internet communication is a accomplished by exchange
of individual ‘packets’ of data.
Each packet is transmitted by its source machine
toward its destination machine.
Connection is actually comprised
Of individual packets travelling
b/w two machine.
If ‘agree’ it means connect or it will
be resend back to the machine.
 Firewall cannot prevent Virus and Trojans
from the accessing the internet.
 Mostly virus and trojan are received via e-mail
direct downloading ,etc
 Firewall not really protect the system from hackers
(or any ultra surf)
 Hard to upgrade
 Take up physical space
 Multi Protocol Label Switching is arranged between
Layer 2 and Layer 3
 Versatile solution:-speed ,QOS ,traffic management
Security management.
 Mechanisms to manage traffic flows of various
granularities (Flow Management)
 Is independent of Layer-2 and Layer-3 protocols
 Maps IP-addresses to fixed length labels
 Supports ATM, Frame-Relay and Ethernet
• Label
• Label Edge Router (LER)
• Forwarding Equivalence Router (FER)
• Label Switching Router (LSR)
• Label Distribution Protocol (LDP)
• Short fixed length entity
 20-bits label value
 Each label head contain four fields
Label Format
• Resides at the edge of an MPLS network and assigns and
removes the labels from the packets.
• Support multiple ports connected to dissimilar networks (such as
frame relay, ATM, and Ethernet).
• Is a high speed router in the core on an MPLS network.
• ATM switches can be used as LSRs without changing their
hardware. Label switching is equivalent to VP/VC switching.
• An application layer protocol for the distribution of label
binding information to LSRs.
• It is used to map FECs to labels, which, in turn, create LSPs.
• LDP sessions are established between LDP peers in the
MPLS network (not necessarily adjacent).
• In MPLS, traffic engineering is inherently provided using explicitly
routed paths.
• The LSPs are created independently, specifying different paths that
are based on user-defined policies. However, this may require
extensive operator intervention.
• RSVP-TE and CR-LDP are two possible approaches to supply
dynamic traffic engineering and QoS in MPLS.
• Improves packet-forwarding performance in the network
• Supports QoS and CoS for service differentiation
• Supports network scalability
• Integrates IP and ATM in the network
• Builds interoperable networks
 Unknown knowledge of the technology
 Miscommunication of networks still occur
 Near replacement of MPLS technology has to be put
in place of old technology
 Hardware problems
 Better security needs to be implemented so hackers
cannot get into technology
Jagtar Singh Dhaliwal
Roll No.-08588911806
Jagtar.singh@fiib.edu.com

More Related Content

What's hot

What's hot (20)

VPLS Fundamental
VPLS FundamentalVPLS Fundamental
VPLS Fundamental
 
Juniper mpls best practice part 1
Juniper mpls best practice   part 1Juniper mpls best practice   part 1
Juniper mpls best practice part 1
 
Hot standby router protocol (hsrp) using
Hot standby router protocol (hsrp) usingHot standby router protocol (hsrp) using
Hot standby router protocol (hsrp) using
 
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]
 
MPLS VPN
MPLS VPNMPLS VPN
MPLS VPN
 
SDWAN vs MPLS: What Enterprises need?
SDWAN vs MPLS: What Enterprises need?SDWAN vs MPLS: What Enterprises need?
SDWAN vs MPLS: What Enterprises need?
 
MPLS Traffic Engineering
MPLS Traffic EngineeringMPLS Traffic Engineering
MPLS Traffic Engineering
 
MPLS (Multi-Protocol Label Switching)
MPLS  (Multi-Protocol Label Switching)MPLS  (Multi-Protocol Label Switching)
MPLS (Multi-Protocol Label Switching)
 
Overview of Spanning Tree Protocol
Overview of Spanning Tree ProtocolOverview of Spanning Tree Protocol
Overview of Spanning Tree Protocol
 
MPLS (Multiprotocol Label Switching)
MPLS (Multiprotocol Label Switching)MPLS (Multiprotocol Label Switching)
MPLS (Multiprotocol Label Switching)
 
MPLS Presentation
MPLS PresentationMPLS Presentation
MPLS Presentation
 
MPLS (Multi-Protocol Label Switching)
MPLS (Multi-Protocol Label Switching)MPLS (Multi-Protocol Label Switching)
MPLS (Multi-Protocol Label Switching)
 
Introduction to vxlan
Introduction to vxlanIntroduction to vxlan
Introduction to vxlan
 
How BGP Works
How BGP WorksHow BGP Works
How BGP Works
 
SEGMENT Routing
SEGMENT RoutingSEGMENT Routing
SEGMENT Routing
 
MPLS Tutorial
MPLS TutorialMPLS Tutorial
MPLS Tutorial
 
Access control list [1]
Access control list [1]Access control list [1]
Access control list [1]
 
ISE-802.1X-MAB
ISE-802.1X-MABISE-802.1X-MAB
ISE-802.1X-MAB
 
EVPN Introduction
EVPN IntroductionEVPN Introduction
EVPN Introduction
 
Vpn
VpnVpn
Vpn
 

Viewers also liked

Face recognition using artificial neural network
Face recognition using artificial neural networkFace recognition using artificial neural network
Face recognition using artificial neural network
Sumeet Kakani
 
Face recognition using neural network
Face recognition using neural networkFace recognition using neural network
Face recognition using neural network
Indira Nayak
 

Viewers also liked (11)

MPLS
MPLSMPLS
MPLS
 
Nat pat
Nat patNat pat
Nat pat
 
NAT (network address translation) & PAT (port address translation)
NAT (network address translation) & PAT (port address translation)NAT (network address translation) & PAT (port address translation)
NAT (network address translation) & PAT (port address translation)
 
FACE RECOGNITION USING NEURAL NETWORK
FACE RECOGNITION USING NEURAL NETWORKFACE RECOGNITION USING NEURAL NETWORK
FACE RECOGNITION USING NEURAL NETWORK
 
Face recognization using artificial nerual network
Face recognization using artificial nerual networkFace recognization using artificial nerual network
Face recognization using artificial nerual network
 
Nat
Nat Nat
Nat
 
SPEECH RECOGNITION USING NEURAL NETWORK
SPEECH RECOGNITION USING NEURAL NETWORK SPEECH RECOGNITION USING NEURAL NETWORK
SPEECH RECOGNITION USING NEURAL NETWORK
 
What is Network Address Translation (NAT)
What is Network Address Translation (NAT)What is Network Address Translation (NAT)
What is Network Address Translation (NAT)
 
Face recognition using artificial neural network
Face recognition using artificial neural networkFace recognition using artificial neural network
Face recognition using artificial neural network
 
Multi-Protocol Label Switching: Basics and Applications
Multi-Protocol Label Switching: Basics and ApplicationsMulti-Protocol Label Switching: Basics and Applications
Multi-Protocol Label Switching: Basics and Applications
 
Face recognition using neural network
Face recognition using neural networkFace recognition using neural network
Face recognition using neural network
 

Similar to MPLS ppt

Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notes
Vamsi Krishna Kalavala
 
Network Built For Local Area Networks Essay
Network Built For Local Area Networks EssayNetwork Built For Local Area Networks Essay
Network Built For Local Area Networks Essay
Katyana Londono
 
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docxChapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
bartholomeocoombs
 
Glossary of introduction to networks
Glossary of introduction to networksGlossary of introduction to networks
Glossary of introduction to networks
evelyn
 
Nwk assignment body copy
Nwk assignment body   copyNwk assignment body   copy
Nwk assignment body copy
Tonny Michael
 

Similar to MPLS ppt (20)

CCNA 1
CCNA 1CCNA 1
CCNA 1
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notes
 
Essay On Ethernet
Essay On EthernetEssay On Ethernet
Essay On Ethernet
 
CCN CEP.pptx
CCN CEP.pptxCCN CEP.pptx
CCN CEP.pptx
 
Network Built For Local Area Networks Essay
Network Built For Local Area Networks EssayNetwork Built For Local Area Networks Essay
Network Built For Local Area Networks Essay
 
Document
DocumentDocument
Document
 
Data center & wireless lan
Data center & wireless lanData center & wireless lan
Data center & wireless lan
 
Ccna report
Ccna reportCcna report
Ccna report
 
Ccna1 presentation
Ccna1 presentationCcna1 presentation
Ccna1 presentation
 
C C N A Day5
C C N A  Day5C C N A  Day5
C C N A Day5
 
Link_NwkingforDevOps
Link_NwkingforDevOpsLink_NwkingforDevOps
Link_NwkingforDevOps
 
nv.ppt
nv.pptnv.ppt
nv.ppt
 
Network architecture - part-I
Network architecture - part-INetwork architecture - part-I
Network architecture - part-I
 
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docxChapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
 
Mpls vpn1
Mpls vpn1Mpls vpn1
Mpls vpn1
 
important network terminologies
important network terminologiesimportant network terminologies
important network terminologies
 
Glossary of introduction to networks
Glossary of introduction to networksGlossary of introduction to networks
Glossary of introduction to networks
 
CCNA ppt
CCNA pptCCNA ppt
CCNA ppt
 
UNIT 7-UNDERSTANDING LARGER NETWORKS.pptx
UNIT 7-UNDERSTANDING LARGER NETWORKS.pptxUNIT 7-UNDERSTANDING LARGER NETWORKS.pptx
UNIT 7-UNDERSTANDING LARGER NETWORKS.pptx
 
Nwk assignment body copy
Nwk assignment body   copyNwk assignment body   copy
Nwk assignment body copy
 

More from Jagtar Dhaliwal

More from Jagtar Dhaliwal (8)

FIIB-ITP-2015-Jagtar_Singh
FIIB-ITP-2015-Jagtar_SinghFIIB-ITP-2015-Jagtar_Singh
FIIB-ITP-2015-Jagtar_Singh
 
SCM Big Bazaar ppt
SCM Big Bazaar pptSCM Big Bazaar ppt
SCM Big Bazaar ppt
 
MARKETING NPD
MARKETING NPDMARKETING NPD
MARKETING NPD
 
Fevicol Main Group 3 (1)
Fevicol Main Group 3 (1)Fevicol Main Group 3 (1)
Fevicol Main Group 3 (1)
 
OM PPT final
OM PPT finalOM PPT final
OM PPT final
 
HBO-Movie Analysis(Shawshank Redemotion)
HBO-Movie Analysis(Shawshank Redemotion)HBO-Movie Analysis(Shawshank Redemotion)
HBO-Movie Analysis(Shawshank Redemotion)
 
Maruti case_LAB_Group 4 final
Maruti case_LAB_Group 4 finalMaruti case_LAB_Group 4 final
Maruti case_LAB_Group 4 final
 
BRM
BRMBRM
BRM
 

MPLS ppt

  • 2.  RCS Global Limited is an emerging in software business solution & IT infrastructure. With the motto of “Provide Quality Solution at the Right Price at the Right time”.  The company is redefining the concepts of IT services and consulting.  RCS Global is the sister concern of ‘RAMA Group’ founded in 1992.
  • 3.  Product Realization - Excellent team work & services.  Business Process Consulting – Total satisfaction of client.  IT Implementation – Focus on core business.  Database Design – Store huge DB i.e. secure & robust.  Business Intelligent – Expertise Troubleshoot.  Offshore Development Centre – preparing efficient & . reliable team.
  • 4.  MEDI-SUITE  EDU-SUITE  SAP  .NET  RAMCO
  • 5.
  • 6.  Straight Cable- Switch to router Switch to PC or server Hub to PC or server  Cross Cable- Switch to switch Switch to hub Hub to hub Router to router PC to PC Router to PC
  • 7.  IP is an address of a Computer on a network.  task of delivering datagrams from the source host to the destination host solely based on the addresses.  Two IP version-IPv4 and IPv6  IPv4(Internet Protocol version 4)for 32 bits  IPv6(Internet Protocol version6)for 128 bits  Type of IP Address  Static IP Address (Automatically assign)  Dynamic IP Address (Manually assign)
  • 8.  There are five classes available in IP range  Class A- 1.0.0.1 to 126.255.255.254  Class B- 128.1.0.1 to 191.255.255.254  Class C- 192.1.0.1 to 223.255.255.254  Class D- 224.1.0.1 to 239.255.255.254  Class E- 240.1.0.1 to 254.255.255.254 Range 127.0.0.1 is reserved for loopback
  • 9.  Class A- assign large number of hosts  Class B- assign large to medium network  Class C- used in small LAN configuration  Class D- reserved for multicasting purposes  Class E- for research and developing centre
  • 10.
  • 11.  With the rapid growth of the internet & the ever- increasing demand for new addresses, the standard address class structure has been expanded by borrowing bits from the Host portion to allow for more Networks.  There are default standard subnet masks for Class A, B and C addresses:
  • 12.  The PING (Packet Internet Groper) command verifies OSI Layer 3 (Network Layer) connectivity.  The subnet mask is the same for all users on a specific network.  Internet routing devices traditionally have been called gateways A network gateway is an internetworking system capable of joining together two networks that use different base protocols.
  • 13.  A choke point of control and monitoring .  Interconnects networks with differing trust.  Imposes restrictions on network services.  only authorized traffic is allowed  Improve network security & reduce risks to hosts
  • 14. Characterized by protocol level it controls in  Packet filtering (filter incoming & outgoing data)  Circuit gateways (large network filter)  Application gateways (Need separate proxies for each service)  Combination of above is dynamic packet filter
  • 15.  Internet communication is a accomplished by exchange of individual ‘packets’ of data. Each packet is transmitted by its source machine toward its destination machine. Connection is actually comprised Of individual packets travelling b/w two machine. If ‘agree’ it means connect or it will be resend back to the machine.
  • 16.
  • 17.  Firewall cannot prevent Virus and Trojans from the accessing the internet.  Mostly virus and trojan are received via e-mail direct downloading ,etc  Firewall not really protect the system from hackers (or any ultra surf)  Hard to upgrade  Take up physical space
  • 18.
  • 19.
  • 20.  Multi Protocol Label Switching is arranged between Layer 2 and Layer 3  Versatile solution:-speed ,QOS ,traffic management Security management.
  • 21.  Mechanisms to manage traffic flows of various granularities (Flow Management)  Is independent of Layer-2 and Layer-3 protocols  Maps IP-addresses to fixed length labels  Supports ATM, Frame-Relay and Ethernet
  • 22. • Label • Label Edge Router (LER) • Forwarding Equivalence Router (FER) • Label Switching Router (LSR) • Label Distribution Protocol (LDP)
  • 23. • Short fixed length entity  20-bits label value  Each label head contain four fields Label Format
  • 24. • Resides at the edge of an MPLS network and assigns and removes the labels from the packets. • Support multiple ports connected to dissimilar networks (such as frame relay, ATM, and Ethernet).
  • 25. • Is a high speed router in the core on an MPLS network. • ATM switches can be used as LSRs without changing their hardware. Label switching is equivalent to VP/VC switching.
  • 26.
  • 27. • An application layer protocol for the distribution of label binding information to LSRs. • It is used to map FECs to labels, which, in turn, create LSPs. • LDP sessions are established between LDP peers in the MPLS network (not necessarily adjacent).
  • 28. • In MPLS, traffic engineering is inherently provided using explicitly routed paths. • The LSPs are created independently, specifying different paths that are based on user-defined policies. However, this may require extensive operator intervention. • RSVP-TE and CR-LDP are two possible approaches to supply dynamic traffic engineering and QoS in MPLS.
  • 29. • Improves packet-forwarding performance in the network • Supports QoS and CoS for service differentiation • Supports network scalability • Integrates IP and ATM in the network • Builds interoperable networks
  • 30.  Unknown knowledge of the technology  Miscommunication of networks still occur  Near replacement of MPLS technology has to be put in place of old technology  Hardware problems  Better security needs to be implemented so hackers cannot get into technology
  • 31. Jagtar Singh Dhaliwal Roll No.-08588911806 Jagtar.singh@fiib.edu.com