Nokia Lab | LAB 4 LDP |


Hi!

Move forward to MPLS stack. The first one is LDP.  I make emphasis on LDP session process and interaction between LIB and LFIB. I recommend you use traffic dumps and debug for investigation. 
Please check my first lab for input information.

Topology example




Lab tasks and questions:
  • Basic LDP
  • prepare basic and IGP configuration (Multi-area OSPF, area type - normal, add "system" to OSPF)
  • enable LDP on P2P interfaces
  • LDP session
  • examine LDP neighbor discovery process
  • What is the destination IP address of Hello messages?
  • examine LDP session establishment
    • What address does SR-OS router use as a transport address for LDP control plane?
  • examine Label exchange
    • What label mapping does SR-OS router generate by default?
  • LIB and LFIB
    • examine LIB and LFIB
    • What is the difference between LIB and LFIB?
    • configure ECMP 2 (e.g. on R1) and examine RT, LIB and LFIB
  • Export policy and summarization
    • create two additional loopback interfaces on R1 with addresses from the same subnet (e.g. 172.16.0.0/32, 172.16.0.1/32)
    • export prefixes to LDP by policy
    • examine LFIB on R2
    • Does it contain entries with target prefixes? What about LIB?
    • What is the reason for this difference?
  • add loopback Continue reading
  • A Digital Dystopia: How Calls for Backdoors to Encryption Would Ruin the Internet for Everyone

    A little over a year into the COVID-19 pandemic, our reliance on private, safe, and secure communication has become more critical than ever. So it’s no surprise that organizations across all sectors are increasingly adopting encryption. It’s our strongest digital security tool online, keeping the information we share in daily activities like online banking, working […]

    The post A Digital Dystopia: How Calls for Backdoors to Encryption Would Ruin the Internet for Everyone appeared first on Internet Society.

    MUST READ: Deploy AWS Security Rules in a GitOps World with Terraform, GitLab CI, Slack, and Python

    I know the title sounds like a buzzword-bingo-winning clickbait, but it’s true. Adrian Giacometti decided to merge the topics of two ipSpace.net online courses and automated deployment of AWS security rules using Terraform within GitLab CI pipeline, with Slack messages serving as manual checks and approvals.

    Not only did he do a great job mastering- and gluing together so many diverse bits and pieces, he also documented the solution and published the source code:

    Want to build something similar? Join our Network Automation and/or Public Cloud course and get started. Need something similar in your environment? Adrian is an independent consultant and ready to work on your projects.

    MUST READ: Deploy AWS Security Rules in a GitOps World with AWS, Terraform, GitLab CI, Slack, and Python

    I know the title sounds like a buzzword-bingo-winning clickbait, but it’s true. Adrian Giacometti decided to merge the topics of two ipSpace.net online courses and automated deployment of AWS security rules using Terraform within GitLab CI pipeline, with Slack messages serving as manual checks and approvals.

    Not only did he do a great job mastering- and gluing together so many diverse bits and pieces, he also documented the solution and published the source code:

    Want to build something similar? Join our Network Automation and/or Public Cloud course and get started. Need something similar in your environment? Adrian is an independent consultant and ready to work on your projects.

    IPv4 in the Headlines

    The world of IPv4 addresses is a relatively obscure backwater of the Internet. All that drama of IPv4 address exhaustion happened with little in the way of mainstream media attention. So it came as a bit of a surprise to see a recent headline in the Washington Post about IPv4 addresses.

    Wi-Fi in 2025: It could be watching your every move

    I consider myself a techno-optimist. Technology has improved life for humanity in countless ways, like the wheel, the printing press, selfie sticks—these marvels have enriched us all.So too has Wi-Fi. If not for Wi-Fi, no one could idly stream YouTube videos on company laptops through rogue hotspots at a busy-but-socially-distanced coffeeshop when we’re supposed to be doing our jobs. Which is to say none of us could fully leverage the remote network-connectivity tools that allow enterprise employees to be productive any time and from anywhere.To read this article in full, please click here

    Wi-Fi in 2025: It could be watching your every move

    I consider myself a techno-optimist. Technology has improved life for humanity in countless ways, like the wheel, the printing press, selfie sticks—these marvels have enriched us all.So too has Wi-Fi. If not for Wi-Fi, no one could idly stream YouTube videos on company laptops through rogue hotspots at a busy-but-socially-distanced coffeeshop when we’re supposed to be doing our jobs. Which is to say none of us could fully leverage the remote network-connectivity tools that allow enterprise employees to be productive any time and from anywhere.To read this article in full, please click here

    DockerCon LIVE 2021: One Month Before Lift Off

    WIth exactly one month before lift off, here’s a quick update on all the goodness that awaits you at this year’s DockerCon LIVE 2021. Like last year, we’ll have one full day of keynotes, breakout sessions across several tracks and live panels and interviews. The current agenda and full list of speakers is available on our website.  

    Engaging in real-time

    A big focus is live content and interaction between speakers and attendees. Our partners at The Cube have worked hard on improving their conference platform and expanding on functionality, so get ready for more real-time content and awesome new features to help speakers and attendees connect, meet, greet, share and learn from each other. 

    Keynotes

    To help set the stage, that day kick’s with must-see keynotes from Docker leadership and compelling guest speakers. We’ll have a special post about our keynote line-up on our blog soon.

    Breakout sessions

    We’re still building out the schedule (yes, that’s what happens when you have so much awesome content to work with!) but we anticipate that we’ll have at least 40 breakout sessions with an absolutely stellar line-up of speakers. You can find the current list of speakers here and the Continue reading

    If you haven’t found the tradeoffs …

    One of the big movements in the networking world is disaggregation—splitting the control plane and other applications that make the network “go” from the hardware and the network operating system. This is, in fact, one of the movements I’ve been arguing in favor of for many years—and I’m not about to change my perspective on the topic. There are many different arguments in favor of breaking the software from the hardware. The arguments for splitting hardware from software and componentizing software are so strong that much of the 5G transition also involves the open RAN, which is a disaggregated stack for edge radio networks.

    If you’ve been following my work for any amount of time, you know what comes next: If you haven’t found the tradeoffs, you haven’t looked hard enough.

    This article on hardening Linux (you should go read it, I’ll wait ’til you get back) exposes some of the complexities and tradeoffs involved in disaggregation in the area of security. Some further thoughts on hardening Linux here, as well. Two points.

    First, disaggregation has serious advantages, but disaggregation is also hard work. With a commercial implementation you wouldn’t necessarily think about these kinds of supply chain issues. Continue reading

    Tech Bytes: Rethinking Network Automation Using Nokia Fabric Services System (Sponsored)

    Operating a data center fabric is a substantial challenge. Nokia Fabric Services System embraces automation to manage your data center fabric. In today's episode, sponsored by Nokia, we dive into Fabric Services System and SR Linux to learn how they bring intent-based automation to your data center.

    The post Tech Bytes: Rethinking Network Automation Using Nokia Fabric Services System (Sponsored) appeared first on Packet Pushers.

    Learning In Public Helps Everyone

    The tradition of technology blogging is built on the idea of learning in public, something Matt’s encouraging with Red Hat’s Enable Architect blog linked in his tweet above. We encourage it at Packet Pushers, too. We think everyone has at least one blog post in them worth sharing with the community. Let us know, and we’ll set you up with an author account.

    Starting a blog, especially for the technically savvy, is not overly difficult, though. Maybe Matt and I are hoping to make it even easier to share by offering our platforms, but I don’t think the time it takes to stand up a blog is necessarily the barrier.

    I think the biggest barrier is the “in public” part. Architects and engineers tend to be introverts who are at times unsure of themselves. We don’t want to be learning in public. We want to be left alone to figure it out. When we’ve figured it out, maybe then will we share, once we’re supremely confident that we’ve got it 110% right. We just don’t Continue reading

    The Week in Internet News: New York State to Require High-Speed Internet at Low Cost

    Cheap Internet required: New York state will require large Internet services providers to offer a $15-a-month subscription to low-income families starting in June, WSKG reports. The state will also partner with philanthropic organizations to provide free high-speed Internet access to 50,000 students in low-income school districts for one year. Not enough chips: A global semiconductor […]

    The post The Week in Internet News: New York State to Require High-Speed Internet at Low Cost appeared first on Internet Society.

    Network Break 330: VMware Stitches Together A SASE Offering; Nvidia’s Arm Purchase On Hold

    This week's Network Break podcast examines VMware's new SASE offering for the distributed workforce, Nvidia's Arm-based accelerators, why the United Kingdom de-accelerated Nvidia's Arm acquisition, new routers from Juniper Networks, and more nerdy IT news.

    The post Network Break 330: VMware Stitches Together A SASE Offering; Nvidia’s Arm Purchase On Hold appeared first on Packet Pushers.

    Project Jengo Redux: Cloudflare’s Prior Art Search Bounty Returns

    Project Jengo Redux: Cloudflare’s Prior Art Search Bounty Returns
    Project Jengo Redux: Cloudflare’s Prior Art Search Bounty Returns

    Here we go again.

    On March 15, Cloudflare was sued by a patent troll called Sable Networks — a company that doesn’t appear to have operated a real business in nearly ten years — relying on patents that don’t come close to the nature of our business or the services we provide. This is the second time we’ve faced a patent troll lawsuit.

    As readers of the blog (or followers of tech press such as ZDNet and TechCrunch) will remember, back in 2017 Cloudflare responded aggressively to our first encounter with a patent troll, Blackbird Technologies, making clear we wouldn’t simply go along and agree to a nuisance settlement as part of what we considered an unfair, unjust, and inefficient system that throttled innovation and threatened emerging companies. If you don’t want to read all of our previous blog posts on the issue, you can watch the scathing criticisms of patent trolling provided by John Oliver or the writers of Silicon Valley.

    We committed to fighting back against patent trolls in a way that would turn the normal incentive structure on its head. In addition to defending the case aggressively in the courts, we also founded Project JengoContinue reading