
By James Regan, Visit Amazon's James Reagan Page, search results, Learn about Author Central, James Reagan,
Еще одна книга про MPLS. Разобрана работа MPLS в сетях с коммутацией пакетом и коммутацией ячеек. Рассмотрена работа VPN в среде MPLS. Взаимодействие CE и PE.
Маршрутизация, проектирование, внедрение.
Read Online or Download Cisco CCIP MPLS Study Guide PDF
Best professional books
Professional LINQ (Programmer to Programmer)
Expert LINQ introduces skilled programmers and database builders to LINQ database queries of their local VB and C# languages. a number of the issues coated include:* LINQ Queries* LINQ and the normal question Operators* Programming with XLinq* Querying XML with XLinq* blending XML and different info types* DLinq and Queries* LINQ over datasets* Interoperating with ADO.
From the local neighborhood department to worldwide Finance to web Banking - transforming into Employment possibilities
Additional resources for Cisco CCIP MPLS Study Guide
Sample text
See Chapter 2 for more information. 22. B. To configure an export route target, use the route-target export number command. See Chapter 6 for more information. 23. A, D. The two ways to implement peer-to-peer VPNs are dedicated router and shared router. See Chapter 4 for more information. 24. B. From inside BGP configuration mode, the address-family vpnv4 command is used to begin the MP-BGP configuration. See Chapter 5 for more information. 25. B. MPLS, the IETF version of Cisco’s tag switching, uses LDP to exchange labels between neighbors.
12 illustrates a simple routed network with various link speeds. In this figure, the objects R1 through R8 represent routers in the network, and the connections OC3 and OC12 represent the speed of the links between them. 12 21 A simple traffic-engineering network OC3 OC3 R2 R1 OC3 R3 OC12 OC3 OC12 R6 R7 OC3 OC12 R4 R5 R8 What is the best path for traffic to flow from R1 to R7? 13. 13 Traffic flow from R1 to R7 OC3 OC3 R2 R1 OC3 R3 OC12 OC3 OC12 OC12 R4 R6 R7 OC3 R5 R8 What if traffic is coming from R8 to R1?
OSPF uses a process for each individual VPN. See Chapter 7 for more information. 21. A. LSRs in the core of the network only need an IGP. Packets will be label-switched and not routed. See Chapter 2 for more information. 22. B. To configure an export route target, use the route-target export number command. See Chapter 6 for more information. 23. A, D. The two ways to implement peer-to-peer VPNs are dedicated router and shared router. See Chapter 4 for more information. 24. B. From inside BGP configuration mode, the address-family vpnv4 command is used to begin the MP-BGP configuration.