This post is going to follow a multicast packet as it moves through a sample MPLS network using Label Switched Multicast (LSM). I'll show how the packet moves through the network by looking at the forwarding tables on different routers and also by doing some packet captures.
This post is part of a series I'm writing on LSM and if you're not already familiar with LSM, I recommend you go back and read the previous posts.
After reading this post you will be able to precisely describe how LSM forwarding works in the data plane and will be able to do some basic troubleshooting.
Let's get into the lab!
Want to be a better engineer? Learn to troubleshoot Since I have been working in IT for many years there are a few traits that generally separate a good engineer from a great engineer. One of those traits is troubleshooting. For those of you out there who have been doing this a long time would […]
The post Want to be a better engineer? Learn to troubleshoot appeared first on Packet Pushers.
Want to be a better engineer? Learn to troubleshoot Since I have been working in IT for many years there are a few traits that generally separate a good engineer from a great engineer. One of those traits is troubleshooting. For those of you out there who have been doing this a long time would […]
The post Want to be a better engineer? Learn to troubleshoot appeared first on Packet Pushers.
Microsoft Azure's IoT philosophy is to support different operating systems and hardware.
Every six months or so, the OpenStack community seems to swing between euphoria and despair – depending on the amount of progress being made in deploying OpenStack in production environments.

The post Worth Reading: Neutron Networking appeared first on 'net work.

There are a number of systems that have been proposed to validate (or secure) the path in BGP. To finish off this series on BGP as a case study, I only want to look at three of them. At some point in the future, I will probably write a couple of posts on what actually seems to be making it to some sort of deployment stage, but for now I just want to compare various proposals against the requirements outlined in the last post on this topic (you can find that post here).
The first of these systems is BGPSEC—or as it was known before it was called BGPSEC, S-BGP. I’m not going to spend a lot of time explaining how S-BGP works, as I’ve written a series of posts over at Packet Pushers on this very topic:
Part 1: Basic Operation
Part 2: Protections Offered
Part 3: Replays, Timers, and Performance
Part 4: Signatures and Performance
Part 5: Leaks
Considering S-BGP against the requirements:
The macro storm is far from over.