Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletter Hub
Free Learning
Arrow right icon
timer SALE ENDS IN
0 Days
:
00 Hours
:
00 Minutes
:
00 Seconds
Arrow up icon
GO TO TOP
OpenDaylight Cookbook

You're reading from   OpenDaylight Cookbook Deploy and operate software-defined networking in your organization

Arrow left icon
Product type Paperback
Published in Jun 2017
Publisher Packt
ISBN-13 9781786462305
Length 336 pages
Edition 1st Edition
Concepts
Arrow right icon
Authors (3):
Arrow left icon
Rashmi Pujar Rashmi Pujar
Author Profile Icon Rashmi Pujar
Rashmi Pujar
ICARO CAMELO ICARO CAMELO
Author Profile Icon ICARO CAMELO
ICARO CAMELO
 Rodrigues Rodrigues
Author Profile Icon Rodrigues
Rodrigues
Arrow right icon
View More author details
Toc

Table of Contents (15) Chapters Close

Title Page
Credits
About the Authors
About the Reviewer
www.PacktPub.com
Customer Feedback
Preface
1. OpenDaylight Fundamentals FREE CHAPTER 2. Virtual Customer Edge 3. Dynamic Interconnects 4. Network Virtualization 5. Virtual Core and Aggregation 6. Intent and Policy Networking 7. OpenDaylight Container Customizations 8. Authentication and Authorization

MPLS intents and label management


NIC's mapping service should make the creation of intents between two endpoints to be handled by the OpenFlow renderer possible. Thus, this renderer can generate OpenFlow rules for push or pop labels to the MPLS endpoint nodes. After an IPv4 Prefix match and forward to port rule once MPLS label match, all the switches that form the shortest path between the endpoints using the Dijkstra algorithm.

Getting ready

Some constraints were added to the intent model for protection and failover mechanism to ensure end-to-end connectivity between endpoints. These constraints aim to reduce the risk of connectivity failure due to a single link or port-down event on a forwarding device. The constraints implemented are:

  • Protection constraint: Requires an end-to-end connectivity to be protected by providing redundant paths
  • Failover: Uses disjoint path calculation algorithms such as Suurballe to provide alternate end-to-end routes
  • Fast-reroute: Uses failure detection features...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime
Visually different images