Solved

Regarding MPLS.

Posted on 2001-09-10
7
288 Views
Last Modified: 2010-03-17
What is the reason for the N^2 ( N * N) connectivity in IP - Atm networks? And how this is resolved in MPLS?
0
Comment
Question by:abhishek_p
7 Comments
 
LVL 16

Expert Comment

by:The--Captain
ID: 6473831
Good question - I presume the reason that such things are said about ATM is due to the fact that all host-host connections need their own circuit (switched, or permanent) configured on the ATM fabric.

I have very little clue wrt MPLS - maybe check out the NANOG archives at merit.edu, or start lurking on the list itself (North American Network Operators Group).  My best advice - post a question there, saying it is off-topic, and request others to respond privately, off-list.  Most NANOGers seem to resent a post like 'Hello.  I heard you guys knew something about networks and so I have a question", rather seeming to prefer a "I don't know much about this subject and am sorry to waste your time - if you feel like helping and know something about this topic, please reply privately so we don't bother anyone who doens't want to hear it".  A bit self-deprecating, I must admit, but the list is populated by some serious networking heavyweights, and if you are nice enough some of them will probably try to help answer.  Technical overlords from all the big carriers seem to hang out there, as well as some rather knowledgeable folks from cisco, as well as one of the principle authors of BIND, etc.  I know they will know the answer - the trick is getting them to help you.

Cheers,
-Jon
0
 

Author Comment

by:abhishek_p
ID: 6473956
Hi,
  Nice to hear this from you but to whom should I contact or somebody will contact me? By the way, according to this persons will, my email ID is alone18@rediffmail.com.  You can contact me here.
regards,
0
 
LVL 16

Accepted Solution

by:
The--Captain earned 100 total points
ID: 6474103
0
Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

 
LVL 16

Expert Comment

by:The--Captain
ID: 6474137
Be sure to search the list archives before posting.

Cheers,
-Jon

0
 

Expert Comment

by:MarkusAurelius
ID: 7125446
Firstly, it's not n^2, it's (n-1) + (n-2) + (n-3)... + 1.  So a network with 6 nodes would require 15 connections to be fully meshed.

This only applies to connection-oriented protocols such as frame relay and ATM.  This is because for one node to communicate to another, a permanent virtual circuit (PVC) or switched virtual circuit (SVC) has to be constructed between each one.

One of the strengths of a connectionless protocol such as IP is that it doesn't reuire these; data is routed via the addressing only.  Otherwise the Internet obviously wouldn't work, if every user had to have a permanent connection mapped out to every website server.

However, the trade-off is that with the lack of flexibility with FR or ATM, you can have quality of service (QoS) guarantees and class of service traffic since you've got a chunk of the bandwidth reserved for each PVC or SVC, whether it's being used or not.  That's inefficient from a bandwidth standpoint, but is traded off for the assurance that your priority traffic will always get through no matter how congested the network gets.

MPLS, though not created to directly address this trade-off, partly tries to have some of both the conection-oriented and connectionless worlds.  It's name, Multi-Protocol Label Switching, indicates the main purpose is to be able to feed different types of networks (FR, IP, ATM, SAN, X.25, etc.) onto one backbone.  One resulting benefit is that while it remains many-to-many (connectionless) like pure IP, you can have QoS guarantees as well.
0
 
LVL 79

Expert Comment

by:lrmoore
ID: 8177550
G'day, abhishek_p
No comment has been added lately (261 days), so it's time to clean up this TA.
I will leave a recommendation in the Cleanup topic area for this question:

RECOMMENDATION: Split points The--Captain and MarkusAurelius

If you would like to keep this question open for more expert input, this cleanup effort will get it closer to the top of the list where it will get more visibility for the experts.

Please leave any comments here within 7 days.


PLEASE DO NOT ACCEPT THIS COMMENT AS AN ANSWER!

Thanks,

lrmoore
EE Cleanup Volunteer
---------------------
If you feel that your question was not properly addressed, or that none of the comments received were appropriate answers, please post a request in Community support (with a link to this page) to refund your points. http://www.experts-exchange.com/Community_Support/
0
 
LVL 16

Expert Comment

by:The--Captain
ID: 8179306
Sounds fine to me

As far as I've ever heard, MPLS is not nearly the sinecure Markus suggests (mainly due to vendor interoperability issues) and that networks built on MPLS tend to have problems...

Cheers,
-Jon
0

Featured Post

Free learning courses: Active Directory Deep Dive

Get a firm grasp on your IT environment when you learn Active Directory best practices with Veeam! Watch all, or choose any amount, of this three-part webinar series to improve your skills. From the basics to virtualization and backup, we got you covered.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This solves the problem of diagnosing why an internet connection is no longer working. It also helps identify the likely cause of the lost connection if the procedure fails to re-establish your internet connection. It helps to pinpoint the likely co…
Cable Modem Provisioning from DPoE compliant server  This Article is to support CMTS administrators to provide an overview of DOCSIS compliance configuration file, and to provision a cable modem located at customer place from a Back office serve…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
I've attached the XLSM Excel spreadsheet I used in the video and also text files containing the macros used below. https://filedb.experts-exchange.com/incoming/2017/03_w12/1151775/Permutations.txt https://filedb.experts-exchange.com/incoming/201…

820 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question