College Reportpdf

download College Reportpdf

of 70

Transcript of College Reportpdf

  • 8/2/2019 College Reportpdf

    1/70

    1 | P a g e

    PART 1

    INTRODUCTORY CHAPTERS

    1.Next Generation Networks2.Routers3.Routing4.Address Translation5.

    Access Control Lists

    6.MPLS7.PHP

  • 8/2/2019 College Reportpdf

    2/70

    2 | P a g e

    1. NEXT GENERATION NETWORKSNext Generation Networking (NGN) is a broad term to describe some key architectural

    evolutions in telecommunication core and access networks that will be deployed over the

    next 5-10 years. The general idea behind NGN is that one network transports all information

    and services (voice, data, and all sorts of media such as video) by encapsulating these into

    packets, like it is on the Internet. NGNs are commonly built around the Internet Protocol, and

    therefore the term "all-IP" is also sometimes used to describe the transformation towards

    NGN.

    According to ITU-T the definition is

    A Next Generation Network (NGN) is a packet-based network able to provide

    services including Telecommunication Services and able to make use of multiple

    broadband, QoS-enabled transport technologies and in which service-related functions

    are independent from underlying transport-related technologies. It offers unrestricted

    access by users to different service providers. It supports generalized mobility which

    will allow consistent and ubiquitous provision of services to users.

    From a practical perspective, NGN involves three main architectural changes that need to be

    looked at separately:

    In the core network, NGN implies a consolidation of several (dedicated or overlay)transport networks each historically built for a different service into one core transport

    network (often based on IP and Ethernet). It implies amongst others the migration of

    voice from a circuit-switched architecture (PSTN) to VoIP, and also migration of

    legacy services such as X.25, Frame Relay (either commercial migration of the

    customer to a new service like IP VPN, or technical emigration by emulation of the

    "legacy service" on the NGN).

    In the wired access network, NGN implies the migration from the "dual" legacy voicenext to xDSL setup in the local exchanges to a converged setup in which we integrate

    voice ports or VoIP, allowing removing the voice switching infrastructure from the

    exchange.

  • 8/2/2019 College Reportpdf

    3/70

    3 | P a g e

    In cable access network, NGN convergence implies migration of constant bit ratevoice to Cable Labs Packet Cable standards that provide VoIP and SIP services. Both

    services ride over DOCSIS as the cable data layer standard.

    In an NGN, there is a more defined separation between the transport (connectivity)

    portion of the network and the services that run on top of that transport. This means

    that whenever a provider wants to enable a new service, they can do so by defining it

    directly at the service layer without considering the transport layer - i.e. services are

    independent of transport details. Increasingly applications, including voice, will tend

    to be independent of the access network (de-layering of network and applications) and

    will reside more on end-user devices (phone, PC, Set-top box).

    1.1 System Architecture

    The basic premise for NGN is architecture on several independent levels. These include the

    access area, the core network area; the control level and the service management level. The

    connection of subscribers and terminals to the NGN can be achieved with various access

    technologies. The information and transmission formats of the various networks must be

    converted into information that is comprehensible for the NGN. This calls for Gateways for

    the connection of business and private customers. The core network of the NGN is an IP

    network. This is a standardized transport platform consisting of various IP routers and

    switches. The connection control of the individual components is carried out by the control

    level. Standard and value-added services can then be provided via the service management

    level.

    MODULAR STRUCTURE OF NGN

  • 8/2/2019 College Reportpdf

    4/70

    4 | P a g e

    The aim of an NGN is to operate the current wide range of access and communications

    technologies under a common umbrella in the future network on IP. This convergence allows

    a transition from a vertical to horizontal service integration. In vertical network structures,

    services (e.g. phone services, TV services) can only be received with suitable networks and

    the relevant end devices. With a horizontal approach, on the other hand, users in future will

    be given the possibility of using the desired services regardless of the platform and the

    technologywith a single end device

    AN ALL IP NETWORK

  • 8/2/2019 College Reportpdf

    5/70

    5 | P a g e

    1.2 Motivation for NGN

    The heterogeneity of the infrastructure, the growing competition and the falling call sales can

    be regarded at present as the primary threats to the telecommunications industry. Established

    network operators are finding themselves forced to rethink their business models and to

    convert their infrastructure to a fully IP-based platformthe Next Generation Network. The

    overall aim is to reduce costs and to create new sources of income.

    Reasons for the Migration to NGN

  • 8/2/2019 College Reportpdf

    6/70

    6 | P a g e

    1.3 Fundamental Characteristics of NGN

    Separation of control functions among bearer capabilities,call/session, and application/ service

    Decoupling of service provision from network, and provision ofopen interfaces

    Support for a wide range of services, applications and mechanismsbased on service building blocks (including real time/ streaming/

    non-real time services and multi-media, Triple- play)

    Broadband capabilities with end-to-end QoS and transparency Inter working with legacy networks via open interfaces Generalized mobility support Unrestricted access by users to different service providers A variety of identification schemes which can be resolved to IP

    addresses for the purposes of routing in IP networks

    Unified service characteristics for the same service as perceived bythe user

    Converged services between Fixed/Mobile Independence of service-related functions from underlying transport

    technologies

    Compliant with all Regulatory requirements, for example concerningaccess to emergency communications and securitymonitoring/privacy, etc.

  • 8/2/2019 College Reportpdf

    7/70

    7 | P a g e

    1.4 Advantages of NGN

    Cost savings

    With fewer components required (e.g. lines, routers, hubs and switches), NGNs are more

    reliable and cheaper to run, as carriers are able to offer equipment and network economies of

    scale by investing in high-end equipment and capacity. Increased flexibility also means that

    expansion or modifying of networks through organic growth and acquisition becomes far

    easier, and ultimately less expensive.

    Productivity

    Emerging services such as IP based voice, web conferencing, collaboration and unified

    messaging can all be supported by NGN. NGNs also provide any time, any place informationflow and presence visibility, similar to MSN Messenger.

    Scalability

    Generally, without disruption to service, users, sites and communication services can be

    added in line with varying business demand. Enterprises can deploy services in a series of

    phases allowing for resource and budgetary constraints. The emergence of NGN points to the

    end ofFork Lift upgrades to both voice and data infrastructures - a desired goal for many

    organizations.

    Business continuity

    Through the use of a common (IP) based infrastructure, business continuity can be easily

    engineered to deliver a more reliable and robust network. The flexibility offered by NGNs as

    an underlying infrastructure means that risk can be mitigated and policies configured to

    protect against service disruption. Traditionally this has often been managed as a separate

    plan rather than as an integral part of the network design.

    Continued technological development means that the traditional phone system can run via an

    NGN, acting as a low cost back-up solution for disaster recovery sites. Increased flexibility of

    design and the ability to merge legacy systems more easily into a manageable infrastructure

    means that NGNs are also able to effectively eliminate single points of failure across the

    network.

  • 8/2/2019 College Reportpdf

    8/70

    8 | P a g e

    2. ROUTERSA router is a device that forwards data packets across computer networks. Routers perform

    the data "traffic directing" functions on the Internet. A router is connected to two or more

    data lines from different networks. When data comes in on one of the lines, the router readsthe address information in the packet to determine its ultimate destination. When multiple

    routers are used in interconnected networks, the routers exchange information about

    destination addresses, using a dynamic routing protocol. Routers may also be used to connect

    two or more logical groups of computer devices known as subnets, each with a different sub-

    network address. A router has two stages of operation called planes.

    Control plane: A router records a routing table listing what route should be used toforward a data packet, and through which physical interface connection. It does this by

    using internal pre-configured addresses, called static routes.

    Forwarding plane: The router forwards data packets between incoming and outgoinginterface connections. It routes it to the correct network type using information that the

    packet header contains. It uses data recorded in the routing table control plane.

    2.1 Router Passwords:

    Console: The console port is where we would initially start to configure a new router.

    Router(config)# line console 0

    Router(config-line)# password secretcisco

    Router(config-line)# login

    Aux: This is short for auxiliary port. This is also a physical access port on the router.

    Router(config)# line aux 0

    Router(config-line)# password secretcisco

    Router(config-line)# login

  • 8/2/2019 College Reportpdf

    9/70

    9 | P a g e

    VTY: We would use this line to Telnet or SSH into the router.

    Router(config)# line vty 0 4

    Router(config-line)# password secretcisco

    Router(config-line)# login

    Enable password: The enable password prevents someone from getting full access to the

    router.

    Router(config)# enable password secretcisco

    Router(config)# exit

    Enable secret: The enable secret password has the same function as the enable password, but

    with enable secret, the password is stored in a much stronger form of encryption:

    Router# configure terminal

    Router(config)# enable secret password

  • 8/2/2019 College Reportpdf

    10/70

    10 | P a g e

    3.ROUTINGRouting is the main process used by Internet hosts to deliver packets. Internet uses a hop-by-

    hop routing model, which means that each host or router that handles a packet examines the

    Destination Address in the IP header, computes the next hop that will bring the packet one

    step closer to its destination, and delivers the packet to the next hop, where the process is

    repeated. There are three types of routing depending upon the type of routing table:

    Static Routing Default Routing Dynamic Routing

    3.1 Static Routing: A static routing table contains information entered manually. The

    administrator enters the route for each destination into the table. When a table is created, it

    cannot update automatically when there is a change in the Internet. The table must be

    manually altered by the administrator. A static routing table can be used in smaller networks

    that do not change very often. With a network that has hundreds of routes, static routes are

    not scalable since one would have to configure each route on each router.

    Static Route Configuration:

    Router(config)# ip route destination_network_# [subnet mask]

    IP_address_of_next_hop_neighbor [administrative_distance] [permanent]

    OR

    Router(config)# ip route destination_network_# [subnet mask]

    Interface_to_exit [administrative_distance] [permanent]

    3.2 IP ROUTING: IP Routing is an umbrella term for the set ofprotocols that determine

    the path that data follows in order to travel across multiple networks from its source to its

    destination. Data is routed from its source to its destination through a series of routers, and

    across multiple networks.

    The Internet, for the purpose of routing, is divided into Autonomous Systems (ASs). An AS

    is a group of routers that are under the control of a single administration and exchange

    routing information using a common routing protocol. An AS can be classified as one of the

    following three types.

  • 8/2/2019 College Reportpdf

    11/70

    11 | P a g e

    A Stub AS has a single connection to one other AS. Any data sent to, or receivedfrom, a destination outside the AS must travel over that connection. A small campus

    network is an example of a stub AS.

    A Transit AS has multiple connections to one or more ASs, which permits data thatis not destined for a node within that AS to travel through it. An ISP network is an

    example of a transit AS.

    A Multihomed AS also has multiple connections to one or more ASs, but it does notpermit data received over one of these connections to be forwarded out of the AS

    again. In other words, it does not provide a transit service to other ASs.

    An Interior Gateway Protocol (IGP) calculates routes within a single AS. The IGP enables

    nodes on different networks within an AS to send data to one another. The IGP also enables

    data to be forwarded across an AS from ingress to egress, when the AS is providing transit

    services. Routes are distributed between ASs by an Exterior Gateway Protocol (EGP). The

    EGP enables routers within an AS to choose the best point of egress from the AS for the data

    they are trying to route.

    The EGP and the IGPs running within each AS cooperate to route data across the Internet.The EGP determines the ASs that data must cross in order to reach its destination, and the

    IGP determines the path within each AS that data must follow to get from the point of ingress

    (or the point of origin) to the point of egress (or the final destination).

    3.3 ROUTING PROTOCOLS: A routing protocol is used by a router to dynamically find

    all the networks in the internetwork and to ensure that all the routers have the same routing

    table. Basically a routing protocol determines the path of a packet through an internetwork.

    Routing protocols used by the Internet Protocol suite include:

    Routing Information Protocol (RIP) Open Shortest Path First (OSPF) Intermediate System to Intermediate System (IS-IS) Interior Gateway Routing Protocol (IGRP) Border Gateway Protocol (BGP)

    http://www.inetdaemon.com/tutorials/internet/ip/routing/igrp/index.shtmlhttp://www.inetdaemon.com/tutorials/internet/ip/routing/igrp/index.shtml
  • 8/2/2019 College Reportpdf

    12/70

    12 | P a g e

    3.4 Administrative distances (AD):

    AD is used to rate the trustworthiness of routing information received on a router from a

    neighbor router. An Administrative Distance is an integer from 0 to 255, where 0 is the most

    trusted and 255 means no traffic will be passed via this route. The route with the lowest AD

    will be placed in the routing table. If both advertised routes to the same network have the

    same AD, then routing protocol metrics (such as hop count or bandwidth of the lines) will be

    used to find the best path to the remote network.

    Default Administrative Distance for a Cisco Router

    Routing Source Default Administrative Distance

    Connected interface 0

    Static Route 1

    EIGRP 90

    IGRP 100

    OSPF 110

    RIP 120

    External EIGRP 170

    Unknown 255 (this route will never be used)

  • 8/2/2019 College Reportpdf

    13/70

    13 | P a g e

    3.5 Three classes of dynamic routing protocols:

    1) Distance-Vector: These protocols find the best path to a remote network by judgingthe distance. The route with the least number of hops to the network is determined to

    be the best route. Both RIP and IGRP are of this type.2) Link State: Also called shortest-path-first protocols. The routers each create three

    separate tables. One of these tables keeps track of directly attached neighbors, one

    determines the topology of the entire internetwork, and one is used as the routing

    table. OSPF is a link state protocol. Link state protocols send updates containing the

    state of their own links to all other routers on the network.

    3) Hybrid: Hybrid protocols use the aspects of both distance vector and link stateprotocols. EIGRP is of this type.

    Metrics: Metrics are used to weight the different paths to a destination. If there is more than

    one way to the destination, the metric is used as a tie-breaker. The router will put the best

    metric paths in its routing table. There are many different types of metrics, such as

    bandwidth, reliability, load, frame size (MTU), delay, and hop-count. Each routing protocol

    uses its own metric structure.

    Metric Routing Protocols Description

    Bandwidth EIGRP, IGRP The capacity of the link in Kbps

    Cost OSPF Measurement in the inverse of the BW of the links

    Delay EIGRP, IGRP Time it takes to reach the destination

    Hop count RIP How many routes away from the destination

    Load EIGRP, IGRP The path with the least utilization

    Maximum

    Transmission

    Unit (MTU)

    EIGRP, IGRP The path that supports the largest frame sizes

    Reliability EIGRP, IGRP Path with the least amount of errors or downtime.

    Ticks IPX RIP Measurement in delay (55 milliseconds)

  • 8/2/2019 College Reportpdf

    14/70

    14 | P a g e

    3.6 OPEN SHORTEST PATH FIRST PROTOCOL (OSPF)

    It is a link state protocol that handles routing for IP traffic.

    Features of OSPF:

    Consists of areas and autonomous systems Minimizes routing update traffic Allows scalability Supports VLSM/CIDR Has unlimited hop count Allows multi-vendor deployment (open standard)

    OSPF has the following main advantages:

    It will run on most routers, since it is based on an open standard. It uses the SPF algorithm, developed by Dijkstra, to provide a loop-free topology. It provides fast convergence with triggered, incremental updates via Link State

    Advertisements (LSAs).

    It is a classless protocol and allows for a hierarchical design with VLSM and routesummarization.

    Given its advantages, OSPF does have its share of disadvantages:

    It requires more memory to hold the adjacency, topology, and routing tables. It requires extra CPU processing to run the SPF algorithm, which is especially true

    when one first turns on the routers and they are initially building the adjacency and

    topology tables.

    For large networks, it requires careful design to break up the network into anappropriate hierarchical design by separating routers into different areas.

    It is complex to configure.

    Configuring OSPF:

    Router(config)# router ospfprocess_ID

    Router(config-router)# network IP_address wildcard_maskarea area_#

    The process_ID is used to differentiate between different OSPF processes running on the

    router. A wildcard mask tells the router what part of the address it should match on. It is 32

    bits long and is an inverted subnet mask.

  • 8/2/2019 College Reportpdf

    15/70

    15 | P a g e

    4. ADDRESS TRANSLATIONAddress translation was originally developed to solve two problems: handling a shortage of

    IP addresses and hiding network addressing schemes. Because of the huge Internet

    explosions during the early 1990s, it was foreseen that the current IP addressing schemewould not accommodate the number of devices that would need public addresses.

    Private Addresses: when devices want to communicate, each device needs a unique IP

    address. The following table shows the range of private addresses:

    CLASS Range Of Address

    A 10.0.0.0 to 10.255.255.255

    B 172.16.0.0 to 172.31.255.255C 192.168.0.0 to 192.168.255.255

    One of the main issues of RFC 1918 addresses is that they can be used only internally within

    a company and cannot be used to communicate to a public network such as the Internet. For

    this reason they are commonly referred to asprivate addresses.

    Address Translation: A second standard, RFC 1631, was created to solve this problem. It

    defines a process which allows us to change an IP address in a packet to a different address.

    Address translation allows us to translate the internal private addresses to public addresses

    before these packets leave the network.

    4.1 Common Address Translation Terms

    TERM DEFINITION

    Inside Networks located on the inside of private network

    Outside Networks located on the outside of private network

    Local The private IP address physically assigned to a device

    Global The public IP address physically or logically assigned to a device

    Inside local IP address An inside device with an assigned private IP address

    Inside global IP address An inside device with a registered public IP address

    Outside global IP address An outside device with a registered public IP address

    Outside local IP address An outside device with an assigned private IP address

  • 8/2/2019 College Reportpdf

    16/70

    16 | P a g e

    4.2 Types of Address Translation:

    Address translation comes in a variety of types, like Network Address Translation (NAT),

    Port Address Translation (PAT), dynamic address translation, and static address translation.

    4.2.1 Network Address Translation (NAT): NAT translates one IP address to another. This

    can be a source address or a destination address. There are two basic implementations of

    NAT: static and dynamic.

    Static NAT: With static NAT, a manual translation is performed by an addresstranslation device, translating one IP address to a different one. The figure given

    below shows a simple example of outside users trying to access an internal web server

    with a private address 10.1.1.1. The web server needs to be presented as having a

    public address. This is defined in the address translation device. The web server is

    assigned an inside global IP address of 200.200.200.1 on the router and the DNS

    server advertises this address to the outside users. When outside users send packets to

    the 200.200.200.1 address, the router examines its translation table for a matching

    entry. On finding the match, the router changes the destination IP address to 10.1.1.1

    and forwards it to the inside web server.

    Likewise, when the web server sends traffic out to the public network, the router

    compares the source IP address to entries in its translation table, and if it finds a

    match, it changes the inside local IP address (10.1.1.1) to the inside global IP address

    (200.200.200.1).

  • 8/2/2019 College Reportpdf

    17/70

    17 | P a g e

    Dynamic NAT: With static address translation, we need to manually build thetranslations. With dynamic NAT, we must manually define two sets of addresses on

    the address translation device. One set defines which inside addresses are allowed to

    be translated, and the other defines what these addresses are to be translated to.

    4.2.2 Port Address Translation (PAT):

    One problem with static or dynamic NAT is that it provides only a one-to-one address

    translation. Therefore, if there are 5,000 internal devices with private addresses, and all 5000

    devices try to reach the Internet simultaneously, we need 5000 public address inside the

    global address pool. If we have only 1000 public addresses, only the first 1000 devices are

    translated and the remaining 4000 will not be able to reach outside destinations.

    To overcome this problem, we can use a process called address overloading. This process is

    also known as Port Address Translation (PAT) and Network Address Port Translation

    (NAPT).

    Using the same IP address: With PAT, all machines that go through the address translation

    device, have the same global IP address assigned to them and so the source port numbers are

    used to differentiate the different connections. If two devices have the same source port

    number, the translation device changes one of them to ensure uniqueness. The translation

    table in PAT consists of the following items:

    Inside local IP address (original source private IP) Inside local port number (original source port number) Inside global IP address (translated public source IP) Inside global port number (new source port number) Outside global IP address (destination public address) Outside global port number (destination port number)

  • 8/2/2019 College Reportpdf

    18/70

    18 | P a g e

    5. ACCESS CONTROL LISTS (ACLs)ACLs are basically a set of commands, grouped together by a number or name, that are used

    to filter traffic entering or leaving an interface. ACL commands define specifically which

    traffic is permitted and which is denied. When activating an ACL on an interface, we mustspecify in which direction the traffic should be filtered:

    Inbound (as the traffic comes into an interface): With inbound ACLs, the routercompares the packet to the interface ACL before the router will forward it to another

    interface.

    Outbound (before the traffic exits an interface): With outbound ACLs, the packetis received on an interface and forwarded to the exit interface. The router thencompares the packet to the ACL.

    One restriction that the ACLs have is that they cannot filter traffic that the router originates

    itself. For example, if we execute a ping or if we telnet from the router to another device,

    ACLs applied to the routers interfaces cannot filter these connections. However, if an

    external device tries to ping or telnet to the router or through the router to a remote

    destination, the router can filter these packets.

    There are two main types of access lists:

    Standard ACL: These can filter only on the source IP address inside a packet. Thismeans that standard access lists basically permit or deny an entire suite of protocols.

    They do not distinguish between any of the many types of IP traffic such as web,

    Telnet, UDP and so on.

    Extended ACL: These can filter on the source and destination IP addresses in thepacket, the IP protocol (TCP, UDP, ICMP, and so on), and protocol information (such

    as the TCP or UDP source and destination port numbers). With an extended ACL, we

    can be very precise in the filtering.

  • 8/2/2019 College Reportpdf

    19/70

    19 | P a g e

    Some general access list guidelines that should be followed while creating and implementing

    access lists on routers:

    One can assign only one access list per interface per protocol per direction. Thismeans that when creating IP access lists we can have only one inbound access list and

    one outbound access list per interface.

    Order of statements is important: organize the access list so that the more restrictivetests are at the top of the access list.

    Any time a new entry is added to the access list, it will be placed at the bottom of thelist.

    The router cannot filter traffic that it itself originates. ACL statements are processed top-down until a match is found, and then no more

    statements in the list are processed.

    If no match is found in the ACL, the packet is dropped (implicit deny). In order for anACL to have an implicit deny statement, we need at least one actual permit or deny

    statement.

    Unless the access list ends with a permit any command, all packets will be discardedif they do not meet any of the lists tests. Every list must have at least one permit

    statement or it will deny all traffic.

    Applying an empty ACL to an interface permits all traffic by default. Each ACL needs either a unique number or a unique name.

    ACL Types and Numbers

    ACL TYPE ACL NUMBERS

    IP Standard 1-99, 1300-1999 (expanded range)

    Standard Vines 1-99

    IP Extended 100-199, 2000-2699 (expanded range)

    Extended Vines 100-199

    DECnet 300-399

    AppleTalk 600-699

    48-bit MAC Address Access List 700-799

    Extended 48-bit MAC Address Access List 1100-1199

  • 8/2/2019 College Reportpdf

    20/70

    20 | P a g e

    Basic ACL Configuration:

    Router(config)# access-list ACL_# permit|deny conditions

    Activating an ACL:

    Router(config)# interface type [slot_#] port_#

    Router(config-if)# ip access-group ACL_# in|out

    5.1 Standard Numbered ACLs

    Basic Configuration:

    Router(config)# access-list1-99/1600-1999 permit/deny

    source_IP_address [wildcard_mask] [log]

    Activation:

    Router(config)# interface type [slot_#] port_#

    Router(config-if)# ip access-group ACL_# in/out

    Examples:

    Router(config)# access-list 1 permit 192.168.1.1

    Router(config)# access-list 1 deny 192.168.1.2

    Router(config)# access-list 1 permit 192.168.1.0 0.0.0.255

    Router(config)# access-list 1deny any

    Router(config)# interface serial 0

    Router(config-if)# ip access-group 1 in

    5.2 Extended Numbered ACLs

    Command Syntax:

    Router(config)# access-list 100-199/2000-2699 permit/deny

    IP_protocol

    source_address Source_wildcard_mask

    [protocol_information]

    Destination_address destination_wildcard_mask

    [protocol_information] [log]

  • 8/2/2019 College Reportpdf

    21/70

    21 | P a g e

    6.Multiprotocol Label Switching6.1 Problems that led to the development of MPLS:

    Traditional IP forwarding based on:

    Routing protocols used to distribute Layer 3 routing information Forwarding based on the destination address only Routing lookups performed on every hop Every router may need full Internet routing information (more than 100,000 routes)

    Let us consider a simple service provider network. The following figure (a) shows four POPs

    (Points of Presence): Delhi, Mumbai, Chennai, and Kolkata. At each of these POPs, the

    routers are connected to ATM switches that are fully meshed, creating the core of the service

    provider network.

    Another way to represent the network is to show the POP locations connected to a cloud in

    figure (b). The cloud is a way to demonstrate the problem faced when integrating ATM and

    IP-based routers. The ATM switches are only concerned with moving traffic based on

    VPI/VCI values of which the IP-based POP routers are unaware. IP-based POP routers are

    Layer 3 devices, concerned with forwarding packets based on information contained in the

    packet, of which the ATM switches are unaware.

    Another problem experienced by service providers is scalability. To allow for maximum

    redundancy and optimum routing, a full mesh of virtual circuits (VCs) must be created,

    resulting in an overlay. For four POP routers connected together with a full mesh of VCs, six

    VCs are required. If two more POP routers are added a total of 15 VCs are required to

  • 8/2/2019 College Reportpdf

    22/70

    22 | P a g e

    provide full-mesh connectivity. As more and more POP routers are added to this core, more

    and more VCs will be required to provide a full mesh.

    Not only are there scalability problems with the number of VCs required implementing a full

    mesh, but there are also scalability problems associated with the routing protocols in use in

    the network. As more and more VCs are created, more and more routers must form

    adjacencies with one another to ensure redundancy. All of these routers must exchange

    routing table updates with every router, thus creating a great deal of traffic that is merely

    updating routing tables. This excessive traffic can utilize significant resources on the routers

    and slow them down.

    The ATM world has a rich feature set that is used for traffic engineering. Traffic engineering

    is simply a process by which traffic is optimized to follow certain paths based on specified

    requirements. The IP world also has features, although not nearly as extensive as ATM, to

    provide for traffic engineering. The problem experienced by service providers is how to

    combine the traffic engineering of IP with the traffic engineering of ATM. Since ATM and IP

    are totally separate technologies, it is difficult to implement combined end-to-end traffic

    engineering.

    Both IP and ATM have Quality of Service (QoS) capabilities. The difference between the

    two has to do with their operation. IP is connectionless and ATM is connection-oriented.

    Again, the problem experienced by a service provider is how to combine these two different

    ways of implementing QoS into a firm end-to-end solution.

    MPLS, as a technology, evolved from early attempts to glue the IP world and ATM world

    together. What we know as MPLS today is, for the most part, a standardized version of

    Ciscos proprietary tag switching.

    MPLS is a new forwarding mechanism in which packets are forwarded based onlabels.

    Labels usually correspond to IP destination networks (equal to traditional IPforwarding)

    Labels can also correspond to other parameters, such as QoS or source address MPLS was designed to support forwarding of other protocols as well

  • 8/2/2019 College Reportpdf

    23/70

    23 | P a g e

    6.2 MPLS architecture:

    MPLS has two major components:

    1) Control Plane:Exchanges Layer 3 routing information and labels. Control plane contains complex

    mechanisms to exchange routing information, such as OSPF, EIGRP, IS-IS and BGP, and to

    exchange labels such as TDP, LDP, BGP and RSVP.

    TDP: The Tag Distribution Protocol (TDP) is Ciscos proprietary protocol that is used to

    bind tags (which are the same as MPLS labels) to network routes in the routing table.

    LDP: The Label Distribution Protocol (LDP) is the IETF version of Ciscos TDP. LDP is

    used to bind labels to network routes. The label information base (LIB) is a mapping of

    incoming labels to outbound labels, along with outbound interface and link information.

    Forwarding Equivalence Class (FEC):

    FEC is a grouping of IP packets that are treated in the same way. For example, a destination

    subnet could correspond to an FEC. Labels are bound to FECs. FECs can be based on a

    number of criteria, including IP ToS bits, IP protocol ID, port numbers, etc.

    2) Forwarding or Data plane:An MPLS-enabled router switches IP packets instead of forwarding them traditionally. The

    forwarding component of the MPLS architecture (known as the forwarding plane or data

    plane) is where information created and maintained from the control plane is actually used.

    The routing table is built in the control plane and cached in the forwarding plane. For labels,

    the LIB is built in the control plane, and only those labels in use reside in the label

    forwarding information base (LFIB). The LFIB is a subset of the LIB. An additional

    component that resides in the forwarding plane is the forwarding information base (FIB). The

    FIB is built by Cisco Express Forwarding (CEF). The FIB is essentially a cached version of

    the IP routing table that eliminates the need for a route-cache. For Cisco MPLS or tag

    switching to work, CEF must be enabled.

  • 8/2/2019 College Reportpdf

    24/70

    24 | P a g e

    6.3 MPLS Network Components:

    CE: A customer edge (CE) device. This is a router that connects to the customer network and

    to a service provider.

    PE: A provider edge (PE) device. This is a service provider piece of equipment that connects

    to a customer and into the provider (P) network.

    P: A provider (P) device. This is a service provider piece of equipment that exists entirely in

    the provider (P) network and only connects to other service provider devices (not to

    customers).

    In addition, the PE and P routers are label switch routers. There are two types of label switch

    routers:

    LSR: A label switch router (LSR) is a Cisco IOS router/switch that is capable of forwarding

    packets based on labels. The CE, or customer, devices are not LSRs and can handle regular

    unlabeled IP packets.

    Functions:

    Exchange routing information Exchange labels Forward packets (LSRs and edge-LSRs) or cells (ATM LSRs and ATM edge-LSRs) Insert (push) a label or a stack of labels on ingress Swap a label with next hop label or a stack of labels in the core Remove (pop) a label on the egress

  • 8/2/2019 College Reportpdf

    25/70

    25 | P a g e

    Edge-LSR: An edge label switch router (edge-LSR) is a more specific term for the PE

    routers. The Edge-LSR may have interfaces that are MPLS-enabled and also has interfaces

    that are not MPLS-enabled. It primarily labels IP packets and forwards them into the MPLS

    domain, or removes labels and forwards IP packets out of the MPLS domain.

    A label-switched path (LSP) is a unidirectional set of LSRs that the labeled packet must flow

    through in order to get to a particular destination.

    Usually only one label is assigned to a packet. The following scenarios may produce more

    than one label:

    MPLS VPNs (two labels: the top label points to the egress router and the second labelidentifies the VPN)

    MPLS TE (two or more labels: the top label points to the endpoint of the trafficengineering tunnel and the second label points to the destination)

    MPLS VPNs combined with MPLS TE (three or more labels)

  • 8/2/2019 College Reportpdf

    26/70

    26 | P a g e

    6.4 Applications of MPLS:

    MPLS and ATM: By turning a standard ATM Forum ATM switch into an ATM label

    switch router (ATM-LSR), it is possible to merge the ATM and IP worlds to provide end-to-end solutions. An ATM-LSR is an ATM switch that is capable of forwarding packets based

    on labels.

    Quality of Service: MPLS addresses QoS by allowing packets to be classified at the network

    edge. Standard IP packets enter the network at an edge-LSR. The Experimental (EXP) field

    of the MPLS label stack is used to hold QoS information for use by MPLS-enabled devices

    along the LSP. The Experimental field is three bits in size. With three bits, a total of eight

    values are possible, but only six values are available for QoS. (The remaining two values are

    reserved for internal network use only.)

    Traffic Engineering: Traffic engineering is described as the process of controlling how

    traffic flows through a network to optimize resource utilization and network performance.

    TE is basically concerned with two problems that occur from routing protocols that only use

    the shortest path as the parameter when they construct a routing table. The shortest paths

    from different sources overlap at some links, causing congestion on those links. The traffic

    from a source to a destination exceeds the capacity of the shortest path, while a longer path

    between these two routers is under-utilized. MPLS can be used as a traffic engineering tool to

    direct traffic in a network in a more efficient way then original IP shortest path routing.

    MPLS can be used to control which paths traffic travels through the network and therefore a

    more efficient use of the network resources can be achieved. Paths in the network can be

    reserved for traffic that is sensitive, and links and router that is more secure and not known to

    fail can be used for this kind of traffic.

    6.5 Advantages of MPLS:

    Traffic can be forwarded based on other parameters (QoS, source, etc). Load sharing across unequal paths can be achieved.

  • 8/2/2019 College Reportpdf

    27/70

    27 | P a g e

    7.PHPPHP is the web development language written by and for web developers. PHP stands for

    PHP: Hypertext Preprocessor. The product was originally named Personal Home Page

    Tools, and many people still think thats what the acronym stands for, but as it expanded in

    scope, a new and more appropriate (albeit GNU-ishly recursive) name was selected by

    community vote. PHP is currently in its sixth major rewrite, called PHP6 or just plain PHP.

    PHP is a server-side scripting language, usually used to create web applications in

    combination with a web server, such as Apache. PHP can also be used to create command-

    line scripts akin to Perl or shell scripts, but such use is much less common than PHPs use as

    a web language.

    Cost

    PHP is one of the Ps in the popular LAMP stack. The LAMP stack refers to the popular

    combination of Linux, Apache, MySQL, and PHP/Perl/Python that runs many web sites and

    powers many web applications. Many of the components of the LAMP stack are free, and

    PHP is no exception. PHP is free, as in there is no cost to develop in and run programs made

    with PHP. Though MySQLs license and costs have changed, we can obtain the Community

    Server edition for free. MySQL offers several levels of support contracts for their database

    server. Both PHP and MySQL run on a variety of platforms, including many variants of

    Linux, Microsoft Windows, and others. Running on an operating system such as Linux gives

    the opportunity for a completely free web application platform, with no up-front costs. Years

    of real-world experience with Linux, Apache, MySQL, and PHP in production environments

    has proved that the total cost of maintaining these platforms is lower, many times much

    lower, than maintaining an infra- structure with proprietary, non-free software

  • 8/2/2019 College Reportpdf

    28/70

    28 | P a g e

    HTML-embeddedness: A Sample PHP program: PHP can be embedded within

    HTML. In other words, PHP pages are ordinary HTML pages that escape into PHP mode

    only when necessary. Here is an example:

    Example.com greeting

    Hello,

    . We know who you are! Your first name is .

    You are visiting our site at

    Here is a link to your account management page: />s account

    management page

    When a client requests this page, the web server preprocesses it. This means it goes through

    the page from top to bottom, looking for sections of PHP, which it will try to resolve. For one

    thing, the parser will suck up all assigned variables (marked by dollar signs) and try to plugthem into later PHP commands (in this case, the echo function). If everything goes smoothly,

  • 8/2/2019 College Reportpdf

    29/70

    29 | P a g e

    the preprocessor will eventually return a normal HTML page to the clients browser, as

    shown in

    A result of preprocessed PHP

    the View menu will look like this:

    Example.com greeting

    Hello,Ms. Park. We know who you are! Your first name is Joyce.

    You are visiting our site at 2002-04-21 19:34:24

    Here is a link to your account management page: Joyces account management page

    This code is exactly the same as if we were to write the HTML by hand.

  • 8/2/2019 College Reportpdf

    30/70

    30 | P a g e

    The HTML-embeddedness of PHP has many helpful consequences:

    PHP can quickly be added to code produced by WYSIWYG editors. PHP lends itself to a division of labor between designers and programmers. Every line of HTML does not need to be rewritten in a programming language. PHP can reduce labor costs and increase efficiency because of its shallow learning

    curve and ease of use.

    Cross-platform compatibilityo PHP and MySQL run native on every popular flavor of Linux/Unix (including

    Mac OS X) and Microsoft Windows.

    o PHP is compatible with the leading web servers: Apache HTTP Server forLinux/Unix and Windows and Microsoft Internet Information Server.

    o It also works with several lesser-known servers.

    Stability : The word stable means two different things in this context:o The server doesnt need to be rebooted or restarted often.o The software doesnt change radically and incompatibly from release to

    release. To our advantage, both of these connotations apply to both MySQL

    and PHP.

    o Apache Server is generally considered the most stable of major web servers,with a reputation for enviable uptime percentages. Most often, a server reboot

    isnt required for each setting change. PHP inherits this reliability; plus, its

    own implementation is solid yet lightweight.

  • 8/2/2019 College Reportpdf

    31/70

    31 | P a g e

    Role of PHP in our project:In our project we are using one of the most interesting

    features of PHP. We are using server side scripting which will be discussed in detail later. We

    will host our dynamic webpages using server side scripting also known as a CGI (Common

    Gateway interface). The technological aspects and screenshots are given below for a much

    clearer understanding

    Server-side web scripting is mostly about connecting web sites to backend servers,

    processing data and controlling the behavior of higher layers such as HTML and CSS. This

    enables the following types of two-way communication:

    Server to client: Web pages can be assembled from backend-server output.

    Client to server: Customer-entered information can be acted upon.

    Server-side scripting products consist of two main parts: the scripting language and the

    scripting engine (which may or may not be built into the web server). The engine parses and

    interprets pages written in the language.

    What Is Server-Side Scripting Good For? Server-side scripting languages such as PHP

    perfectly serve most of the truly useful aspects of the web, such as the items in this list:

    Content sites (both production and display)

    Community features (forums, bulletin boards, and so on)

    Customer-support and technical-support systems

    Advertising networks

    Directories and membership rolls

    Surveys, polls, and tests

    Filling out and submitting forms online

    Personalization technologies

    Catalog, brochure, and informational sites

    CGI Script: The Common Gateway Interface (CGI) is a standard (method for web server

    software to delegate the generation of web pages to executable files. Such files are known as

    CGI scripts; they are programs, often stand-alone applications, usually written in a scripting

    language.

  • 8/2/2019 College Reportpdf

    32/70

    32 | P a g e

    PART 2

    PROJECT DESCRIPTION

    Our project is mainly based on emulation of Next Generation Networks i.e. IP-based network

    designed for providing scalable converged Triple play services. The project is mainly a small

    depiction of core and access part of a network. Security is provided by means of service

    policies and end-to-end QoS is provided by means of class maps.

    Backbone of our network is Cisco 7200 Advanced Enterprise Router connected in a mesh

    topology and main protocol is MPLS-TE. Aggregation and Access is Cisco 36745 IVS router

    and routing protocol is OSPF v2. Provider Edge Routers are connected to Costumer Routers

    by BGP4 and CME routers are equipped with Cisco Call Manager Express which is capable

    of handling 180 IP Phones. Video Access is provided by means of DVMP tunnel from source

    to connecting Access routers. This project can serve a small or medium Organization which

    does not need very high level of security though communication to other sites is possible by

    means of VPN or GRE tunnels

    1.

  • 8/2/2019 College Reportpdf

    33/70

    33 | P a g e

    CORE NETWORK

    A core network, or network core, is the central part of a telecommunication network that

    provides various services to customers who are connected by the access network. It typically

    provides the following functionality:

    1. Aggregation: The highest level of aggregation in a service provider network. Thenext level in the hierarchy under the core nodes is the distribution networks and then

    the edge networks. Customer Premise Equipment (CPE) does not normally connect to

    the core networks of a large service provider.

    2. Authentication: The function to decide whether the user requesting a service fromthe telecom network is authorized to do so within this network or not.

    3. Call Control/Switching: Call control or switching functionality decides the futurecourse of call based on the call signaling processing.

    4. Charging: This functionality handles the collation and processing of charging datagenerated by various network nodes.

    5. Service Invocation: Core network performs the task of service invocation for itssubscribers. Service invocation may happen based on some explicit action (e.g. call

    transfer) by user or implicitly (call waiting).

    6. Gateways: Gateways shall be present in the core network to access other networks.Gateway functionality is dependent on the type of network it interfaces with.

    The core in the project is MPLS-based with various Quality of Service functionalities. The

    routing protocol used is OSPF.

  • 8/2/2019 College Reportpdf

    34/70

    34 | P a g e

    1.1 Configuring OSPF:

    Router(config)# router ospfprocess_ID

    Router(config-router)# network IP_address wildcard_maskarea area_#

    e.g. Router(config)# router ospf100Router(config-router)# network 192.168.1.1 0.0.0.255 area 0

    1.2 MPLS on providing backbone:

    Router(config)# ip cef

    Router(config)# mpls label protocol [ldp | tdp | both]

    Router(config)# interface {int}

    Router(config-if)# mpls ip

    MPLS QoS:

    Router(config)# mls qos

    Router(config)# interface {int}

    Router(config-if)# mls qos

    1.3 VPN Routing and Forwarding (VRF):

    VRF is a technology that allows multiple instances of tables to co-exist on the same router.

    Each instance operates independently and provides isolation between different clients running

    the same address space. A VRF consists of a separate RIB (Routing Information Base), FIB

    (Forwarding Information Base) and LFIB (Label Forwarding Information Base) table per

    instance. It is locally significant to a router. Traffic that enters on a VRF enabled interface

    will belong to that VRF instance. Each interface can only be assigned to one VRF, but a VRF

    can have many interfaces assigned.

    Configuring MPLS VPN:

    Router(config)# ip vrf {name}

    Router(config-vrf)# ip vrf{vrf-name}Router(config-vrf)# rd {router-distinguisher}

  • 8/2/2019 College Reportpdf

    35/70

    35 | P a g e

    Router(config-vrf)# route-target export {rt}

    Router(config-vrf)# route-target import {rt}

    Router(config-vrf)# import map {route-map}

    Router(config-vrf)# export map {route-map}

    Router(config-vrf)# vpn id {vpn-index}

    Router(config-vrf)# maximum routes {limit} [warn-thres | warn-only]

    Router(config)# interface {int}

    Router(config-if)# ip vrf forwarding {name}

    1.4 Configuring MP-BGP:

    Router(config)# router bgp as-number

    Router(config-router)# no bgp default ipv4-unicast

    Router(config-router)# neighbor {ip-address}remote-asas-number

    Router(config-router)# address-family nsap [unicast]

    Router(config-router-af)# neighborip-address activate

    1.5 MPLS and service policing on each Interface

    PER_1(config-if)#mpls ip

    PER_1(config-if)#mpls bgp forwarding

    PER_1(config-if)#mpls traffic-eng flooding thresholds down

    PER_1(config-if)#mpls label protocol ldp

    PER_1(config-if)#service-policy output VOICEPER_1(config-if)#traffic-shape rate 800000 1000000

    R1(config-if)#bgp-policy accounting input

    Global config settings

    PER_1(config)#username gaurav secret cisco

    PER_1(config)#aaa new-modelPER_1(config)#aaa authentication login default local enable

  • 8/2/2019 College Reportpdf

    36/70

    36 | P a g e

    PER_1(config)#aaa authentication enable default enable line

    PER1(config)#aaa authorization exec default if-authenticated

    PER_1(config)#router ospf 100

    PER_1(config-router)#network 10.10.10.0 0.0.0.255 area 0

    PER_1(config-router)#network 192.168.1.0 0.0.0.255 area 0

    PER_1(config-router)#network 2.2.2.2 0.0.0.255 area 0

    R1(config-router)#redistribute bgp 100 subnets

    R1(config-router)#redistribute bgp 200 subnets

    R1(config-router)#redistribute connected subnets

    R1(config-router)#log-adjacency-changes detail

    PER_1(config)#mpls ip

    PER_1(config)#mpls traffic-eng path-selection metric te

    PER_1(config)#ip access-list extended VOICE

    PER_1(config-ext-nacl)#permit ip 192.168.10.0 0.0.0.255 any

    PER_1(config-ext-nacl)#permit ip 192.168.10.0 0.0.0.255 any

    PER_1(config)#class-map VOICE

    PER_1(config-cmap)#match access-group name VOICE

    PER_1(config)#policy-map VOICE

    PER_1(config-pmap)#class VOICE

    PER_1(config-pmap-c)#shape average percent 30

    PER_1(config-pmap-c)#shape fr-voice-adapt

    PER_1(config-pmap-c)#fair-queue

    ER_1(config)#router bgp 100

    PER_1(config-router)#neighbor 192.168.1.2 remote-as 200

    PER_1(config-router)#redistribute ospf 100

  • 8/2/2019 College Reportpdf

    37/70

    37 | P a g e

    2.AGGREGATION

    Link aggregation describe various methods of combining (aggregating) multiple network

    connections in parallel to increase throughput beyond what a single connection could sustain,

    and to provide redundancy in case one of the links fails.

    Link aggregation offers an inexpensive way to set up a high-speed backbone network that

    transfers much more data than any one single port or device can deliver. This allows several

    devices to communicate simultaneously at their full single-port speed while not allowing any

    one single device to monopolize all available backbone capacity.

    Link aggregation also allows the network's backbone speed to grow incrementally as demand

    on the network increases, without having to replace everything and buy new hardware.

    The figure above shows the aggregation used in our project. The core network connects to

    Provider Edge Router 1 with the network address of 192.168.1.0 with a subnet of /32 and

    Provider Edge Router 2 with the network address of 192.168.1.0 with a subnet of /32

  • 8/2/2019 College Reportpdf

    38/70

    38 | P a g e

    3.ACCESS NETWORKAn access network is that part of a telecommunications network which connects subscribers

    to their immediate service provider. It is contrasted with the core network, which connects

    local providers to each other.

    Depending on the technology used for accessing NGN services, the access network includes

    functions related to:

    1) Cable access

    2) xDSL access

    3) Wireless access (e.g. IEEE 802.11 and 802.16 technologies, and 3G RAN access)

    4) Optical access

  • 8/2/2019 College Reportpdf

    39/70

    39 | P a g e

    4.INTERNET ACCESS

  • 8/2/2019 College Reportpdf

    40/70

    40 | P a g e

    5.IPTVInternet Protocol television (IPTV) is a system through which television services are

    delivered using the Internet protocol suite over a packet-switched network such as

    the Internet, instead of being delivered through traditional terrestrial, satellite signal,and cable television formats.

    IPTV is represented by a profile of closed, proprietary TV systems such as those present

    today on cable services but delivered via IP-based secure channels representing a sharp

    increase in control of content distribution.

    5.1 MULTICASTING settings

    WWW(config)#ip multicast auto-enableWWW(config)#ip multicast-routing

    WWW(config)#ip pim rp-address 192.168.99.1

    Interface fa 0/0

    WWW(config-if)#ip pim sparse-dense-mode

    WWW(config)#int tunnel 0

    WWW(config-if)#ip address 172.16.10.1 255.255.255.0

    WWW(config-if)#tunnel source fastEthernet 0/0

    WWW(config-if)#tunnel mode dvmrp

  • 8/2/2019 College Reportpdf

    41/70

    41 | P a g e

    5.2 DHCP configuration

    CME_2(config)#ip dhcp pool IP

    CME_2(dhcp-config)#network 192.168.10.0 255.255.255.0

    CME_2(dhcp-config)#option 150 ip 192.168.10.1

    CME_2(dhcp-config)#default-router 192.168.10.1

  • 8/2/2019 College Reportpdf

    42/70

    42 | P a g e

    6.VOIPVoice over IP (VoIP) commonly refers to the communication protocols, technologies,

    methodologies, and transmission techniques involved in the delivery of voice

    communications and multimedia sessions over Internet Protocol (IP) networks, such as

    the Internet. Other terms commonly associated with VoIP areIP telephony,Internet

    telephony, voice over broadband(VoBB), broadband telephony, and broadband phone.

    There are several advantages to using Voice Over IP, including advanced features that

    standard telephone systems are not capable of and the ability to have a phone number usually

    associated with a particular local area anywhere in the world. But the biggest single

    advantage VoIP has over standard telephone systems is cost. In addition, international calls

    using VoIP are usually very inexpensive. One other advantage, which will become much

    more pronounced as VoIP use climbs, calls between VoIP users are usually free.

  • 8/2/2019 College Reportpdf

    43/70

    43 | P a g e

    6.1 Telephony Service

    CME_2(config)#telephony-service

    CME_2(config-telephony)#max-dn 10

    CME_2(config-telephony)#max-ephones 10

    CME_2(config-telephony)#max-conferences 4 gain -6

    CME_2(config-telephony)#auto-reg-ephone

    CME_2(config-telephony)#moh music.wav

    CME_2(config-telephony)#ip source-address 192.168.10.1 port 20

    CME_2(config)#ephone 1

    CME_2(config-ephone)#codec g7129r8

    CME_2(config-ephone)#type cIPC

    CME_2(config-ephone)#button 1:2

    CME_2(config)#ephone-dn 1

    CME_2(config-ephone-dn)#number 1001

    CME_2(config-ephone-dn)#label PHN

    CME_2(config-ephone-dn)#call-waiting beep

    CME_2(config-ephone-dn)#name PHONE 2

  • 8/2/2019 College Reportpdf

    44/70

    44 | P a g e

    PART 3CONCLUSION

    The traditionally familiar market boundaries between fixed networks, mobile telephony and

    data networks are disappearing more and more quickly. This gives the customer the

    advantage that he can call on an extremely wide range of services, regardless of his access

    technology. Next Generation Networks will help in this development.

    The market already features individual examples of a general trend toward the convergence

    of various technologies, communications channels and media. Particularly remarkable isVoIP, which has developed strongly in the last two years, with its use of the Internet for

    phone calls (which was not actually designed for this purpose).

    At the end of the day, the network convergence will also lead to a convergence of the end

    devices, depending on the actual needs. Multimedia-compatible computers will be given

    telephone and video communication functions, data services will be available by telephone

    and Internet access via the television (browsing using an Internet-compatible setup box) and

    the cell-phone will be common.

    In our project we have fully tried to emulate the Next Generation Networks. In the course of

    the project development we have come across several hurdles like implementing BGP,

    creating a dynamic webpage using PHP and also implementing the servers using Apache. We

    also faced problems in implementing VOIP and IPTV. Most of the time it was because we

    had forgotten to activate an interface or set up an IP address properly. With practice, we

    improved our skills as well as our knowledge in network designing.

    One of the aspects that our project does not cover is IPTV billing or IP phone usage. Also,

    Layer 2 emulation is also not possible so switches are not used in the project.

    This network design can be used for small and medium businesses with only one switch.

    FUTURE PROSPECTS: Upgrading from IPv4 to IPv6 for future prospects can be achieved.

    Addition of physical Access switches to the topology to provide more security and VLAN

    support which is very important in large organizations can also be done.

  • 8/2/2019 College Reportpdf

    45/70

    45 | P a g e

    APPENDICES

    APPENDIX A: About GNS3

    APPENDIX B: Running Configurations

    APPENDIX C: Abbreviations

    APPENDIX D: Definitions

  • 8/2/2019 College Reportpdf

    46/70

    46 | P a g e

    APPENDIX A: About GNS3

    GNS3 is a graphical network simulator that allows simulation of complex networks. It

    allows us to run a Cisco IOS in a virtual environment on our computer. To allow complete

    simulations, GNS3 is strongly linked with:

    Dynamips, the core program that allows Cisco IOS emulation. Dynagen, a text-based front-end for Dynamips. It runs on top of dynamips to create a

    more user-friendly text-based environment.

    Qemu, a generic and open source machine emulator and virtualizer.

    Features:

    Design of high quality and complex network topologies Emulation of many Cisco router platforms and PIX firewalls Simulation of simple Ethernet, ATM and Frame Relay switches Connection of the simulated network to the real world Packet capture using Wireshark

    Advantages:

    Emulation is possible for a long list of router platforms and PIX firewalls There are a number of router simulators on the market, but they are limited to the

    commands that the developer chooses to include. In these simulators we are only

    seeing a representation of the output of a simulated router. While with GNS3 we are

    running an actual Cisco IOS, so we will see exactly what the IOS produces and will

    have access to any command or parameter supported by the IOS.

    GNS3 is an open source, free program that may be used on multiple operatingsystems, including Windows, Linux, and MacOS X.

    Drawbacks:

    We need our own Cisco IOS images in order to make use of the simulator. GNS3does not come with built-in IOS images and explicitly states on the front of their page

    that users must provide their own IOS images.

    Another drawback would be the amount of CPU resources used by GNS3. When anIOS is running, it will consume up to 100% of the CPU time. This will cause the

    computer to become very sluggish and will prevent building more complextopologies.

  • 8/2/2019 College Reportpdf

    47/70

    47 | P a g e

    Configuring the location for a Cisco IOS

    1) On the Edit menu choose IOS images and hypervisors.

    2) Under the IOS Images tab, click and find the Cisco IOS file and clickOpen.

    3) Click the drop-down arrow next to Platform and choose the platform thatcorresponds to the IOS file.

  • 8/2/2019 College Reportpdf

    48/70

    48 | P a g e

    4) Click the drop-down arrow next to Model and choose the model corresponding to theIOS file.

    GNS3 Window:

    It is divided into four panes: The left-most pane lists the type of nodes available. The right-most pane will provide a topology summary. The top pane of the middle section is the work area where topology may be

    graphically built.

    The bottom pane of the middle section is called the Console and shows the Dynagenat work.

  • 8/2/2019 College Reportpdf

    49/70

    49 | P a g e

    APPENDIX B: Running Configurations

    R1: Hostname > P1

    !

    upgrade fpd auto

    version 12.4

    service timestamps debug datetime msec

    service timestamps log datetime msec

    no service password-encryption

    !

    hostname P1

    !

    boot-start-marker

    boot-end-marker

    !

    logging message-counter syslog

    enable secret 5 $1$oEaL$0/t0JEboLpr6RDUuPGph7.

    !

    aaa new-model

    !

    aaa authentication username-prompt Enter

    aaa authentication login default local enable

    aaa authentication enable default enable line

    aaa authorization exec default if-authenticated

    !

    aaa session-id common

    ip source-route

    ip cef

    !

    no ip domain lookup

    no ipv6 cef

    !

    multilink bundle-name authenticated

    !

    rtsp client rtpsetup enable

    !

    memory-size iomem 0

    username gaurav secret 5$1$hp6V$S8KwBLU5eS2TDDXC2NqUh/

    archive

    log config

    hidekeys

    !

    crypto isakmp key cisco address 192.168.5.0255.255.255.0

    !

    class-map match-all VOICE

    match access-group name VOICE

    class-map match-all class1

    description class map for core router

    match any

    match protocol appletalk

    !

  • 8/2/2019 College Reportpdf

    50/70

    50 | P a g e

    policy-map pol1

    class class1

    policy-map VOICE

    class VOICE

    shape average percent 30

    !

    interface FastEthernet0/0

    no ip address

    shutdown

    duplex half

    !

    interface GigabitEthernet1/0

    ip address 10.10.10.1 255.255.255.252

    negotiation auto

    mpls ip

    traffic-shape rate 800000 1000000 1000000 1000

    bgp-policy accounting input

    !

    interface GigabitEthernet2/0

    ip address 10.10.10.5 255.255.255.252

    negotiation auto

    mpls ip

    !

    interface GigabitEthernet3/0

    ip address 10.10.10.9 255.255.255.252

    negotiation auto

    mpls ip

    !

    interface FastEthernet4/0

    description INTERFACE TO SERVERS ORBACKHAND

    ip address 192.168.99.1 255.255.255.252

    duplex auto

    speed auto

    mpls ip

    !

    interface FastEthernet4/1

    no ip address

    shutdown

    duplex auto

    speed auto

    !

    router ospf 100

    log-adjacency-changes

    redistribute connected subnets

    redistribute bgp 100

    network 10.10.10.0 0.0.0.255 area 0

    network 192.168.99.0 0.0.0.255 area 10

    !

    ip forward-protocol nd

    no ip http server

    no ip http secure-server

    !

  • 8/2/2019 College Reportpdf

    51/70

    51 | P a g e

    ip access-list extended VOICE

    permit ip 192.168.10.0 0.0.0.255 any

    permit ip 192.168.5.0 0.0.0.255 any

    !

    control-plane

    !

    mgcp fax t38 ecm

    !

    gatekeeper

    shutdown

    !

    line con 0

    exec-timeout 0 0

    logging synchronous

    stopbits 1

    line aux 0

    stopbits 1

    line vty 0 4

    exec-timeout 180 0

    password cisco

    login authentication cisco

    line vty 5 100

    exec-timeout 180 0

    password cisco

    login authentication cisco

    !

    end

    R2: Hostname > PER_1

    !

    upgrade fpd auto

    version 12.4

    service timestamps debug datetime msec

    service timestamps log datetime msec

    no service password-encryption

    !

    hostname PER_1

    !

    boot-start-marker

    boot-end-marker

    !

    logging message-counter syslog

    enable secret 5$1$enmu$qjDDVkFEqWIpZSgzwzHZI1

  • 8/2/2019 College Reportpdf

    52/70

    52 | P a g e

    !

    aaa new-model

    !

    aaa authentication login default local enable

    aaa authentication enable default enable line

    aaa authorization exec default if-authenticated

    !

    aaa session-id common

    ip source-route

    ip cef

    !

    no ip domain lookup

    no ipv6 cef

    !

    multilink bundle-name authenticated

    mpls traffic-eng fast-reroute backup-prot-preemptoptimize-bw

    !

    memory-size iomem 0

    username gaurav secret 5$1$IGJm$bvRXfu9CuKMnxE2E7R7j/.

    archive

    log config

    hidekeys

    !

    interface FastEthernet0/0

    no ip address

    shutdown

    duplex half

    !

    interface GigabitEthernet1/0

    ip address 10.10.10.2 255.255.255.252

    negotiation auto

    mpls bgp forwarding

    mpls ip

    !

    interface GigabitEthernet2/0

    ip address 10.10.10.13 255.255.255.252

    negotiation auto

    mpls label protocol ldp

    mpls ip

    !

    interface GigabitEthernet3/0

    ip address 10.10.10.17 255.255.255.252

    negotiation auto

    mpls ip

    !

  • 8/2/2019 College Reportpdf

    53/70

    53 | P a g e

    interface FastEthernet4/0

    ip address 192.168.1.1 255.255.255.252

    duplex auto

    speed auto

    mpls ip

    !

    interface FastEthernet4/1

    no ip address

    shutdown

    duplex auto

    speed auto

    !

    router ospf 100

    log-adjacency-changes

    redistribute connected subnets

    network 10.10.10.0 0.0.0.255 area 0

    network 192.168.1.0 0.0.0.255 area 1

    !

    ip forward-protocol nd

    no ip http server

    no ip http secure-server

    !

    control-plane

    !

    mgcp fax t38 ecm

    !

    gatekeeper

    shutdown

    !

    line con 0

    exec-timeout 0 0

    logging synchronous

    stopbits 1

    line aux 0

    stopbits 1

    line vty 0 4

    !

    end

  • 8/2/2019 College Reportpdf

    54/70

    54 | P a g e

    R3: Hostname > PER_2

    !

    upgrade fpd auto

    version 12.4

    service timestamps debug datetime msec

    service timestamps log datetime msec

    no service password-encryption

    !

    hostname PER_2

    !

    boot-start-marker

    boot-end-marker

    !

    ip cef

    !

    logging message-counter syslog

    enable secret 5$1$YmUc$NYMJDvxcmjGO4zjwtCpP7.

    !

    aaa new-model

    !

    aaa authentication login default local enable

    aaa authentication enable default enable line

    aaa authorization exec default if-authenticated

  • 8/2/2019 College Reportpdf

    55/70

    55 | P a g e

    !

    aaa session-id common

    cef table consistency-check IPv4

    ip source-route

    no ip domain lookup

    no ipv6 cef

    !

    multilink bundle-name authenticated

    mpls traffic-eng logging lsp path-errors

    mpls traffic-eng fast-reroute backup-prot-preemptoptimize-bw

    !

    memory-size iomem 0

    username gaurav secret 5$1$x8JN$mSD/Chy.DyNSdEstjtteg.

    archive

    log config

    hidekeys

    !

    interface FastEthernet0/0

    no ip address

    shutdown

    duplex half

    !

    interface GigabitEthernet1/0

    ip address 10.10.10.14 255.255.255.252

    negotiation auto

    mpls ip

    !

    interface GigabitEthernet2/0

    ip address 10.10.10.6 255.255.255.252

    negotiation auto

    mpls ip

    !

    interface GigabitEthernet3/0

    ip address 10.10.10.21 255.255.255.252

    negotiation auto

    mpls ip

    !

    interface FastEthernet4/0

    ip address 192.168.2.1 255.255.255.252

    duplex auto

    speed auto

    mpls ip

    !

    interface FastEthernet4/1

    no ip address

    shutdown

    duplex auto

    speed auto

  • 8/2/2019 College Reportpdf

    56/70

    56 | P a g e

    !

    router ospf 100

    log-adjacency-changes

    redistribute connected subnets

    network 10.10.10.0 0.0.0.255 area 0

    network 192.168.2.0 0.0.0.255 area 2

    !

    ip forward-protocol nd

    no ip http server

    no ip http secure-server

    !

    control-plane

    !

    mgcp fax t38 ecm

    !

    gatekeeper

    shutdown

    !

    line con 0

    exec-timeout 0 0

    password cisco

    logging synchronous

    stopbits 1

    line aux 0

    stopbits 1

    line vty 0 4

    password cisco

    line vty 5 100

    password cisco

    !

    end

    R4: Hostname > CER_1

    !

    version 12.4

    service timestamps debug datetime msec

    service timestamps log datetime msec

    no service password-encryption

    !

    hostname CER_1

    !

    boot-start-marker

    boot-end-marker

    !

    enable secret 5 $1$VFQv$E19pdcz9j.psmA54y8JG2.

    !

    aaa new-model

  • 8/2/2019 College Reportpdf

    57/70

    57 | P a g e

    !

    aaa authentication login default local enable

    aaa authentication enable default enable line

    aaa authorization exec default if-authenticated

    !

    aaa session-id common

    memory-size iomem 5

    ip cef

    !

    multilink bundle-name authenticated

    !

    rtsp client rtpsetup enable

    !

    username gaurav secret 5$1$VeLT$wCwV8fkvWQcK5jvz3S7j90

    archive

    log config

    hidekeys

    !

    class-map match-all VOICE

    match access-group name VOICE

    !

    !

    policy-map VOICE

    class VOICE

    shape average percent 30

    !

    police cir percent 30

    conform-action set-dscp-transmit af11

    !

    interface FastEthernet0/0

    no ip address

    shutdown

    duplex auto

    speed auto

    !

    interface FastEthernet0/1

    no ip address

    shutdown

    duplex auto

    speed auto

    service-policy output VOICE

    !

    interface FastEthernet1/0

    no ip address

    shutdown

    duplex auto

    speed auto

    !

    ip forward-protocol nd

    !

    ip http server

    shutdown

  • 8/2/2019 College Reportpdf

    58/70

    58 | P a g e

    ip access-list extended VOICE

    permit ip 192.168.10.0 0.0.0.255 any

    !

    control-plane

    !

    gatekeeper

    !

    line con 0

    line aux 0

    line vty 0 4

    !

    end

    R5: Hostname > CER_2

    !

    version 12.4

    service timestamps debug datetime msec

    service timestamps log datetime msec

    no service password-encryption

    !

    hostname CER_2

    !

    boot-start-marker

    boot-end-marker

    !

    enable secret 5 $1$nP9k$T0S5shIj0.4X0KRaD/rFL/

    !

    aaa new-model

    !

    aaa authentication login default local enable

    aaa authentication enable default enable line

    aaa authorization exec default if-authenticated

    !

    aaa session-id common

    memory-size iomem 5

    ip cef

    !

    multilink bundle-name authenticated

    !

    rtsp client rtpsetup enable

    !

    username gaurav secret 5

    $1$tlCL$xjyy710dBMJMlJknGmhRI/

    archive

    log config

    hidekeys

    !

  • 8/2/2019 College Reportpdf

    59/70

    59 | P a g e

    class-map match-all VOICE

    match access-group name VOICE

    !

    policy-map VOICE

    class VOICE

    shape average percent 30

    police cir percent 30

    conform-action set-dscp-transmit af11

    !

    interface FastEthernet0/0

    no ip address

    shutdown

    duplex auto

    speed auto

    service-policy output VOICE

    !

    interface FastEthernet0/1

    no ip address

    shutdown

    duplex auto

    speed auto

    !

    interface FastEthernet1/0

    no ip address

    !

    interface FastEthernet1/0

    no ip address

    shutdown

    duplex auto

    speed auto

    !

    ip forward-protocol nd

    !

    ip http server

    !

    ip access-list extended VOICE

    permit ip 192.168.10.0 0.0.0.255 any

    !

    control-plane

    !

    gatekeeper

    shutdown

    !

    line con 0

    line aux 0

    line vty 0 4

    !

    end

  • 8/2/2019 College Reportpdf

    60/70

    60 | P a g e

    R6: Hostname > P2

    !

    upgrade fpd auto

    version 12.4

    service timestamps debug datetime msec

    service timestamps log datetime msec

    no service password-encryption

    !

    hostname P2

    !

    boot-start-marker

    boot-end-marker

    !

    logging message-counter syslog

    enable secret 5 $1$JG0f$gWVBswqosZBSlQazvj9zv1

    !

    aaa new-model

    !

    aaa authentication login default local enable

    aaa authentication enable default enable line

    aaa authorization exec default if-authenticated

    !

    aaa session-id common

    cef table consistency-check IPv4

    ip source-route

    ip cef

    !

    no ip domain lookup

    no ipv6 cef

    !

    multilink bundle-name authenticated

    mpls traffic-eng logging lsp path-errors

    mpls traffic-eng fast-reroute backup-prot-preempt

    optimize-bw

    !

    memory-size iomem 0

    username gaurav secret 5$1$BBbT$obzM5CmGg9SDwR75qBmq3.

    archive

    log config

    hidekeys

    !

    class-map match-all VOICE

    description VOICE CLASS

    match access-group name VOICE

    !

    policy-map VOICE

    class VOICE

    shape average percent 30

    set qos-group dscp

  • 8/2/2019 College Reportpdf

    61/70

    61 | P a g e

    !

    interface FastEthernet0/0

    no ip address

    shutdown

    duplex half

    !

    interface GigabitEthernet1/0

    ip address 10.10.10.18 255.255.255.252

    negotiation auto

    mpls ip

    !

    interface GigabitEthernet2/0

    ip address 10.10.10.22 255.255.255.252

    negotiation auto

    mpls ip

    !

    interface GigabitEthernet3/0

    ip address 10.10.10.10 255.255.255.252

    negotiation auto

    mpls ip

    !

    router ospf 100

    log-adjacency-changes

    redistribute connected subnets

    network 10.10.10.0 0.0.0.255 area 0

    !

    ip forward-protocol nd

    no ip http server

    no ip http secure-server

    !

    ip access-list extended VOICE

    permit ip 192.168.10.0 0.0.0.255 any

    !

    control-plane

    !

    mgcp fax t38 ecm

    !

    gatekeeper

    shutdown

    !

    line con 0

    exec-timeout 0 0

    logging synchronous

    stopbits 1

    line aux 0

    stopbits 1

    line vty 0 4

    password cisco

    line vty 5 100

    password cisco

    !

    end

  • 8/2/2019 College Reportpdf

    62/70

    62 | P a g e

    R7: Hostname > CME_1

    !

    version 12.4

    service timestamps debug datetime msec

    service timestamps log datetime msec

    no service password-encryption

    !

    hostname CME_1

    !

    boot-start-marker

    boot-end-marker

    !

    enable secret 5$1$onbJ$nWDak5EfgMGgQwTCkixIW/

    !

    aaa new-model

    !

    aaa authentication login default local enable

    aaa authentication enable default enable line

    aaa authorization exec default if-authenticated

    !

    aaa session-id common

    memory-size iomem 5

    ip cef

    !

    multilink bundle-name authenticated

    !

    rtsp client rtpsetup enable

    !

    username gaurav secret 5$1$eKp5$jf1y7NNm3.7fexjqRMPAr/

    archive

    log config

    hidekeys

    !

    class-map match-all VOICE

    match access-group name VOICE

    !

    policy-map VOICE

    class VOICE

    shape average percent 30

    police cir percent 30

    conform-action set-dscp-transmit af11

    !

    interface FastEthernet0/0

    no ip address

    shutdown

    duplex auto

    speed auto

    service-policy output VOICE

    !

  • 8/2/2019 College Reportpdf

    63/70

    63 | P a g e

    interface FastEthernet0/1

    no ip address

    shutdown

    duplex auto

    speed auto

    !

    ip forward-protocol nd

    !

    ip http server

    !

    ip access-list extended VOICE

    permit ip 192.168.10.0 0.0.0.255 any

    !

    control-plane

    !

    gatekeeper

    shutdown

    !

    line con 0

    line aux 0

    line vty 0 4

    !

    end

    R8: Hostname > CME_2

    !

    version 12.4

    service timestamps debug datetime msec

    service timestamps log datetime msec

    no service password-encryption

    !

    hostname CME_2

    !

    boot-start-marker

    boot-end-marker

    !

    enable secret 5 $1$AB.4$8tCoJvV7BurrYdMHJx3.b0

    !

    aaa new-model

    !

    aaa authentication login default local enable

    aaa authentication enable default enable line

    aaa authorization exec default if-authenticated

    !

    aaa session-id common

    memory-size iomem 5

    ip cef

    !

  • 8/2/2019 College Reportpdf

    64/70

    64 | P a g e

    multilink bundle-name authenticated

    !

    rtsp client rtpsetup enable

    !

    username gaurav secret 5$1$p4xA$Eoy9vu0kbJDFLUjCdNzaC.

    archive

    log config

    hidekeys

    !

    class-map match-all VOICE

    match access-group name VOICE

    !

    policy-map VOICE

    class VOICE

    shape average percent 30

    police cir percent 30

    conform-action set-dscp-transmit af11

    interface FastEthernet0/0

    no ip address

    shutdown

    duplex auto

    speed auto

    service-policy output VOICE

    interface FastEthernet0/1

    no ip address

    shutdown

    duplex auto

    speed auto

    service-policy output VOICE

    ip forward-protocol nd

    ip http server

    ip access-list extended VOICE

    permit ip 192.168.10.0 0.0.0.255 any

    !

    control-plane

    !

    gatekeeper

    shutdown

    telephony-service

    max-ephones 10

    max-dn 10

    max-conferences 8 gain -6

    transfer-system full-consult

    ephone-dn 1

    !

    ephone 1

    !

    line con 0

    line aux 0

    line vty 0 4

    !

    end

  • 8/2/2019 College Reportpdf

    65/70

    65 | P a g e

    R9: Hostname > www

    !

    version 12.4

    service timestamps debug datetime msec

    service timestamps log datetime msec

    no service password-encryption

    !

    hostname WWW

    !

    boot-start-marker

    boot-end-marker

    !

    enable secret 5$1$nNYj$eeDHCYEB0yTd1SD0k4c900

    !

    aaa new-model

    !

    aaa authentication login default local enable

    aaa authentication enable default enable line

    aaa authorization exec default if-authenticated

    !

    aaa session-id common

    memory-size iomem 5

    ip cef

    !

    no ip domain lookup

    ip multicast-routing

    ip multicast auto-enable

    ip dvmrp interoperability

    multilink bundle-name authenticated

    !

    username gaurav secret 5$1$x.jM$WssJq23vUm2sKZ47nbJgB1

    archive

    log config

    hidekeys

    !

    class-map match-all VOICE

    match access-group name VOICE

    !

    policy-map VOICE

    class VOICE

    shape average percent 30

    police cir percent 30

    conform-action set-dscp-transmit af11

    !

    interface Loopback1

    ip address 9.9.9.9 255.255.255.255

    !

    interface Tunnel0

    description TUNNEL TO MULTICAST

  • 8/2/2019 College Reportpdf

    66/70

    66 | P a g e

    ip address 172.16.10.1 255.255.255.0

    tunnel source FastEthernet0/0

    tunnel destination 192.168.5.0

    tunnel mode dvmrp

    !

    interface FastEthernet0/0

    ip address 192.168.100.2 255.255.255.0

    duplex auto

    speed auto

    !

    interface FastEthernet0/1

    ip address 192.168.98.1 255.255.255.0

    duplex auto

    speed auto

    !

    interface FastEthernet1/0

    ip address 192.168.99.2 255.255.255.252

    duplex auto

    speed auto

    !

    router ospf 100

    log-adjacency-changes

    redistribute connected subnets

    network 9.9.9.9 0.0.0.0 area 10

    network 192.168.98.0 0.0.0.255 area 10

    network 192.168.99.0 0.0.0.255 area 10

    network 192.168.100.0 0.0.0.255 area 10

    !

    ip forward-protocol nd

    !

    no ip http server

    !

    ip access-list extended VOICE

    permit ip 192.168.10.0 0.0.0.255 any

    !

    control-plane

    !

    gatekeeper

    shutdown

    !

    line con 0

    exec-timeout 0 0

    logging synchronous

    line aux 0

    line vty 0 4

    !

    end

  • 8/2/2019 College Reportpdf

    67/70

    67 | P a g e

    APPENDIX C: Abbreviations

    AD: Administrative Distance

    ATM-LSR: ATM label switch router

    CE: Customer Edge

    CEF: Cisco Express Forwarding

    FEC: Forward Equivalence Class

    FIB: Forwarding Information Base

    LDP: Label Distribution Protocol

    LER: Label Edge Router

    LFIB: Label Forwarding Information Base

    LIB: Label Information Base

    LSP: Label Switched Path

    LSR: Label Switch Router

    MP-BGP: MultiprotocolBorder Gateway Protocol

    P: Provider

    PE: Provider Edge

    QoS: Quality of Service

    RD: Route Distinguisher

    TDP: Tag Distribution Protocol

    TE: Traffic Engineering

    VPN: Virtual Private Network

    VRF: VPN Routing and Forwarding (or) Virtual Routing and Forwarding

  • 8/2/2019 College Reportpdf

    68/70

    68 | P a g e

    APPENDIX D: Definitions

    Area border router (ABR): An OSPF router that has interfaces configured for two or more

    areas.

    Autonomous system boundary router (ASBR): An OSPF router that has at least one

    interface in the OSPF domain and one interface connecting to an external network.

    Backbone area: The OSPF Area 0.

    Backbone router: An OSPF router that has at least one interface in Area 0.

    Cisco Express Forwarding (CEF): CEF creates an optimized, cached version of the

    routing table. CEF is a requirement for MPLS and tag switching.

    Control plane: A component of the MPLS architecture that is responsible for binding a label

    to network routes and distributing those bindings among other MPLS-enabled routers.

    Data plane: A component of the MPLS architecture where information that is created and

    maintained from the control plane is actually used. Also known as theforwarding plane.

    Egress router: An edge router where packets leave the network.

    Forwarding equivalence class (FEC): An FEC is a grouping of IP packets that are all

    treated the same way

    Forwarding information base (FIB): A FIB is essentially a cached version of the IP routing

    table that eliminates the need for a route-cache.Ingress router: An edge router where packets enter the network.

    Internal router: An OSPF router that has all configured interfaces in the same OSPF area.

    Label Distribution Protocol (LDP): The Label Distribution Protocol (LDP) is the IETF

    version of Ciscos TDP. LDP is used to bind labels to network routes.

    Label forwarding information base (LFIB): The LIB is built in the control plane, and only

    those labels in use reside in the LFIB. The LFIB is a subset of the LIB.

    Label imposition: The point in the transit of a packet through a service provider network

    where the label is applied by a router and used by subsequent devices to label-switch the

    packet.

    Label information base (LIB): A mapping of incoming labels to outbound labels, along

    with outbound interface and link information.

    Label stacking: An MPLS feature where more than one label can be carried. Label stacking

    is useful for applications such as traffic engineering