13.9. STUDY QUESTIONS

  1. One of the arguments against the LSPing solution (at the time it was originally proposed) was the use of a nonroutable address in the 127/8 range as a destination for the echo request. List some of the advantages of using this type of address.

  2. Why are separate extensions necessary to handle LSPing for P2MP LSPs?

  3. What type of information would the operator want to know for a P2MP LSPing echo request probe?

  4. In the context of automatic reaction to failures, revertive behavior refers to adding back an LSP into the usable pool. What are some of the dangers in aggressively implementing revertive behavior?

  5. Assume that an LDP-signaled LSP experiences a failure due to a mis-configuration as described in Section 13.4.2.1. What is the advantages/disadvantages of removing the LSP from resolution as opposed to applying the scheme described in [LDP-IGP-SYNC]?

  6. An LDP network with high levels of redundancy wants to deploy a scheme to monitor all LSP paths using BFD for MPLS. What would be the model of operation for such a scheme?

  7. Imagine an inter-AS LSP spanning three ASs, AS1, AS2 and AS3. Assume at least two hops within each AS, not counting the inter-AS link. A failure is detected at the first node in AS3. Run through the procedures described in [LSPING-INTERAS] and describe the use of the Visited ASBRs Stack. Examine the additional load on the ASBRs as a result of applying this scheme.

  8. Revisit the example of LSPtrace in a tunneled environment and apply the procedures described ...

Get MPLS-Enabled Applications: Emerging Developments and New Technologies now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.