Packet Tracer BGP Configuration Example To understand BGP (Border Gateway Protocol) better, we will make a basic Packet Tracer BGP Configuration example. Because of the limited numbers of commands available …
Both One-to-One and Facility Backup can protect different network elements. And these can be achieved by two ways: – Node Protection : Protect against the failure of the next downstream …
The goal of the protection is minimizing the down time. To do this, protection must be done near to the failure. Local protection does this. By doing this types of …
As we say in the following articles, while using Secondary LSP-Paths, sharing links between Primary and Secondary LSP-Paths must be avoided. We can say this term “Path Diversity“.There are some …
There are some different types traffic protections. In general we can divide these types into two groups. End-to-end Protection and Local Protection. End-to-end Protection is using Secundary LSP-Paths as a …