Got it

Interworking of devices from other vendors

Latest reply: Mar 17, 2021 08:48:36 202 3 0 0 0

In an IP core network, of the three reliability technologies, which technology can be used in end-to-end interworking with devices from other vendors?

 

A. TE hot standby

 

B. VPN FRR

 

C. TE FRR


DDSN
Admin Created Mar 17, 2021 05:58:38

Hi Abdul500,
Please wait patiently. Our engineers are looking for answers to your questions.
View more
  • x
  • convention:

Hello,

I think to choose C.

Traffic engineering (TE) fast reroute (FRR) protects links and nodes on MPLS TE tunnels. If a link or node fails, TE FRR rapidly switches traffic to a backup path, minimizing traffic loss.

A link or node failure in an MPLS TE tunnel triggers a primary/backup CR-LSP switchover. During the switchover, IGP routes converge to a backup CR-LSP, and CSPF recalculates a path over which the primary CR-LSP is reestablished. Traffic is dropped during this process.

TE FRR can be used to minimize traffic loss. TE FRR establishes a backup path that excludes faulty links or nodes. The backup path can rapidly take over traffic, minimizing traffic loss. In addition, the ingress attempts to reestablish the primary CR-LSP.

TE FRR works in either facility or one-to-one backup mode.

  • Facility backup

    illustrates facility backup networking.

    Figure 4-19 Schematic diagram for TE FRR in facility backup mode
    download?uuid=7d05dd483b614b3c80c4acdccf85fd35

    TE FRR working in facility backup mode establishes a bypass tunnel for each link or node that may fail on a primary tunnel. A bypass tunnel can protect traffic on multiple primary tunnels. TE FRR in facility backup mode is configured to establish a single bypass tunnel to protect primary tunnels. This mode is extensible, resource efficient, and easy to implement. Bypass tunnels must be manually planned and configured, which is time-consuming and laborious on a complex network.

  • One-to-one backup

     illustrates one-to-one backup networking.

    Figure 4-20 Schematic diagram for TE FRR in one-to-one backup mode
    download?uuid=995e7d47c7be424d9cda9a1aa29291ff

    TE FRR in one-to-one backup mode automatically creates a backup CR-LSP on each node along a primary CR-LSP to protects downstream links or nodes. This mode is easy to configure, eliminates manual network planning, and provides flexibility on a complex network. However, this mode has low extensibility, requires maintenance of the backup CR-LSP status on each node, and consumes more bandwidth than the facility backup mode.

  • Hope to help you!



View more
  • x
  • convention:

BAZ
MVE Author Created Mar 17, 2021 08:48:36

VPN FRR


MPLS TE FRR protects services in case a link or node fails between two PEs at both ends of a TE tunnel. MPLS TE FRR, however, cannot protect services in case a PE device fails. If a fault occurs on the ingress or egress, services can only be restored through end-to-end route convergence and LSP convergence. The service convergence time is closely related to the number of routes inside an MPLS VPN and the number of LSP hops on the bearer network. More VPN routes mean longer service convergence time and more lost traffic.

VPN FRR sets forwarding entries in advance that point to active and standby PEs on a remote PE. VPN FRR collaborates with fast PE fault detection to reduce end-to-end service convergence time if a fault occurs in an MPLS VPN (where a CE is dual-homed to two PEs). In VPN FRR, service convergence time only depends on the time required to detect remote PE device faults and change tunnel status. The service convergence time is not affected by the number of VPN routes because of VPN FRR.


View more
  • x
  • convention:

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.