MPLS Networks

Posted on 2013-05-21
Last Modified: 2013-11-13
I have a question about the MPLS networks.. I understand that there is CE-PE pair for each MPLS site.. however, beyond PE .. are there any backbone routers or do the packets directly flow over to the next PE?

I was thinking following traffic flow, up until I came across a few more routers in providers networks.

CE_1 <---> PE_1 <------------> PE_2<---->CE_2
Question by:totaram
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
LVL 24

Expert Comment

ID: 39185967
MPLS routers in the backbone network are called P routers.

CE <-> PE <-> P <-> P <-> PE <-> CE.

P Router: In an MPLS Network,  a Provider (P) Router is a Label Switch Router (LSR) that functions as a transit router of the core network. The P Router typically connects to one or more PE Routers.

Author Comment

ID: 39186002
OK.. so what I hear from above is that label switching is done by the P router and not PE routers... can PE do label switching??
LVL 24

Accepted Solution

aadih earned 150 total points
ID: 39186150
PE routers maintain VPN routes for those VPNs that are members (P routers do not maintain any VPN routes and perform label switching).

A LSR (Label Switched Router) can be at the ingress or egress of the MPLS domain. It generates a label in the ingress, and removes the label at the egress.

It may be worth your while to read a good paper (there are many), e.g.:

<¿ > and read the RFCs.

Author Closing Comment

ID: 39188382
LVL 24

Expert Comment

ID: 39188389
Mention not (You are welcome).  :-)

Featured Post

Is Your DevOps Pipeline Leaking?

Is your CI/CD pipeline a hodge-podge of randomly connected tools? You’ve likely got a tool to fix one problem & then a different tool to fix another, resulting in a cluster of tools with overlapping functionality. Learn how to optimize your pipeline with Gartner's recommendations

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Security is one of the biggest concerns when moving and migrating your data from your on-premise location to the Public Cloud.  Where is your data? Who can access it? Will it be safe from accidental deletion?  All of these questions and more are imp…
I recently attended Cisco Live! in Las Vegas, a conference that boasted over 28,000 techies in attendance, and a week of hands-on learning hosted by a solid partner with which Concerto goes to market.  Every year, Cisco displays cutting-edge technol…
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
After creating this article (, I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question