亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? rfc2430.txt

?? IPv6協(xié)議中flow_label的相關(guān)RFC
?? TXT
?? 第 1 頁 / 共 3 頁
字號:
   To establish the flow to node D, node S first generates an RSVP PATH   message which describes the flow in more detail.  For example, the   flow might require 3kbps of bandwidth, be insensitive to jitter of   less than 50ms, and require a delay of less than 200ms.  This message   is passed through node S's local network and eventually appears in   node S's ISP.  Suppose that this is ISP F.   ISP F has considerable latitude in its options at this point.  The   requirement on F is to place the flow into a trunk before it exits   F's infrastructure.  One thing that F might do is to perform the   admission control function at the first hop router.  At this point, F   would determine if it had the capacity and capability of carrying the   flow across its own infrastructure to an exit router E.  If the   admission control decision is negative, the first hop router canLi & Rekhter                 Informational                     [Page 11]RFC 2430                         PASTE                      October 1998   inform node S using RSVP.  Alternately, it can propagate the RSVP   PATH message along the path to exit router E.  This is simply normal   operation of RSVP on a differentiated flow.   At exit router E, there is a trunk that ISP F maintains that transits   ISP X, Y, and Z and terminates in ISP L.  Based on BGP path   information or on out of band information, Node D is known to be a   customer of ISP L.  Exit router E matches the flow requirements in   the RSVP PATH message to the characteristics (e.g., remaining   capacity) of the trunk to ISP L.  Assuming that the requirements are   compatible, it then notes that the flow should be aggregated into the   trunk.   To insure that the flow reservation happens end to end, the RSVP PATH   message is then encapsulated into the trunk itself, where it is   transmitted to ISP L.  It eventually reaches the end of the trunk,   where it is decapsulated by router U.  PATH messages are then   propagated all the way to the ultimate destination D.   Note that the end-to-end RSVP RESV messages must be carefully handled   by router U.  The RESV messages from router U to E must return via a   tunnel back to router E.   RSVP is also used by exit router E to initialize and maintain the   trunk to ISP L.  The RSVP messages for this trunk are not placed   within the trunk itself but the end-to-end RSVP messages are.  The   existence of multiple overlapping RSVP sessions in PASTE is   straightforward, but requires explicit enumeration when discussing   particular RSVP sessions.6.2 Propagation of user data   Data packets created by S flow through ISP F's network following the   flow reservation and eventually make it to router E.  At that point,   they are given an MPLS label and placed in the trunk.  Normal MPLS   switching will propagate this packet across ISP X's network.  Note   that the same traffic class still applies because the class encoding   is propagated from the precedence bits of the IPv4 header to the CoS   bits in the MPLS label.  As the packet exits ISP X's network, it can   be aggregated into another trunk for the express purpose of   tranisiting ISP Y.   Again, label switching is used to bring the packet across ISP Y's   network and then the aggregated trunk terminates at a router in ISP   Z's network.  This router deaggregates the trunk, and forwards the   resulting trunk towards ISP L.  This trunk transits ISP Z and   terminates in ISP L at router U.  At this point, the data packets are   removed from the trunk and forwarded along the path computed by RSVP.Li & Rekhter                 Informational                     [Page 12]RFC 2430                         PASTE                      October 19986.3 Trunk establishment and maintenance   In this example, there are two trunks in use.  One trunk runs from   ISP F, through ISPs X, Y and Z, and then terminates in ISP L.  The   other aggregated trunk begins in ISP X, transits ISP Y and terminates   in ISP Z.   The first trunk may be established based on a multilateral agreement   between ISPs F, X, Z and L.  Note that ISP Y is not part of this   multilateral agreement, and ISP X is contractually responsible for   providing carriage of the trunk into ISP Z.  Also per this agreement,   the tunnel is maintained by ISP F and is initialized and maintained   through the use of RSVP and an explicit route object that lists ISP's   X, Z, and L.  Within this explicit route, ISP X and ISP L are given   as strict hops, thus constraining the path so that there may not be   other ISPs intervening between the pair of ISPs F and X and the pair   Z and L.  However, no constraint is placed on the path between ISPs X   and Z.  Further, there is no constraint placed on which router   terminates the trunk within L's infrastructure.   Normally this trunk is maintained by one of ISP F's routers adjacent   to ISP X.  For robustness, ISP F has a second router adjacent to ISP   X, and that provides a backup trunk.   The second trunk may be established by a bilateral agreement between   ISP X and Y.  ISP Z is not involved.  The second trunk is constrained   so that it terminates on the last hop router within Y's   infrastructure.  This tunnel is initialized and maintained through   the use of RSVP and an explicit route that lists the last hop router   within ISP Y's infrastructure.  In order to provide redundancy in the   case of the failure of the last hop router, there are multiple   explicit routes configured into ISP X's routers.  These routers can   select one working explicit route from their configured list.   Further, in order to provide redundancy against the failure of X's   primary router, X provides a backup router with a backup trunk.6.4 Robustness   Note that in this example, there are no single points of failure once   the traffic is within ISP F's network.  Each trunk has a backup trunk   to protect against the failure of the primary trunk.  To protect   against the failure of any particular router, each trunk can be   configured with multiple explicit route objects that terminate at one   of several acceptable routers.Li & Rekhter                 Informational                     [Page 13]RFC 2430                         PASTE                      October 19987.0 Security Considerations   Because Priority traffic intrinsically has more 'value' than Best   Effort traffic, the ability to inject Priority traffic into a network   must be carefully controlled.  Further, signaling concerning Priority   traffic has to be authenticated because it is likely that the   signaling information will result in specific accounting and   eventually billing for the Priority services.  ISPs are cautioned to   insure that the Priority traffic that they accept is in fact from a   known previous hop.  Note that this is a simple requirement to   fulfill at private peerings, but it is much more difficult at public   interconnects.  For this reason, exchanging Priority traffic at   public interconnects should be done with great care.   RSVP traffic needs to be authenticated.  This can possibly be done   through the use of the Integrity Object.8.0 Conclusion   The Provider Architecture for differentiated Services and Traffic   Engineering (PASTE) provides a robust, scalable means of deploying   differentiated services in the Internet.  It provides scalability by   aggregating flows into class specific MPLS tunnels.  These tunnels,   also called trunks, can in turn be aggregated, thus leading to a   hierarchical aggregation of traffic.   Trunk establishment and maintenance is done with RSVP, taking   advantage of existing work in differentiated services.  Explicit   routes within the RSVP signaling structure allow providers to perform   traffic engineering by placing trunks on particular links in their   network.   The result is an architecture that is sufficient to scale to meet ISP   needs and can provide differentiated services in the large, support   traffic engineering, and continue to grow with the Internet.8.1 Acknowledgments   Inspiration and comments about this document came from Noel Chiappa,   Der-Hwa Gan, Robert Elz, Lisa Bourgeault, and Paul Ferguson.Li & Rekhter                 Informational                     [Page 14]RFC 2430                         PASTE                      October 19989.0 References   [1] Rosen, E., Viswanathan, A., and R. Callon, "A Proposed       Architecture for MPLS", Work in Progress.   [2] Braden, R., Zhang, L., Berson, S., Herzog, S., and S. Jamin,       "Resource ReSerVation Protocol (RSVP) -- Version 1 Functional       Specification", RFC 2205, September 1997.   [3] Rosen, E., Rekhter, Y., Tappan, D., Farinacci, D., Fedorkow,, G.,       Li, T., and A. Conta, "MPLS Label Stack Encoding", Work in       Progress.   [4] Davie, B., Rekhter, Y., Rosen, E., Viswanathan, A., and V.       Srinivasan, "Use of Label Switching With RSVP", Work in Progress.   [5] Gan, D.-H., Guerin, R., Kamat, S., Li, T., and E. Rosen, "Setting       up Reservations on Explicit Paths using RSVP", Work in Progress.   [6] Davie, B., Li, T., Rosen, E., and Y. Rekhter, "Explicit Route       Support in MPLS", Work in Progress.   [7] http://www.anxo.com/10.0 Authors' Addresses   Tony Li   Juniper Networks, Inc.   385 Ravendale Dr.   Mountain View, CA 94043   Phone: +1 650 526 8006   Fax:   +1 650 526 8001   EMail: tli@juniper.net   Yakov Rekhter   cisco Systems, Inc.   170 W. Tasman Dr.   San Jose, CA 95134   EMail:  yakov@cisco.comLi & Rekhter                 Informational                     [Page 15]RFC 2430                         PASTE                      October 199811.  Full Copyright Statement   Copyright (C) The Internet Society (1998).  All Rights Reserved.   This document and translations of it may be copied and furnished to   others, and derivative works that comment on or otherwise explain it   or assist in its implementation may be prepared, copied, published   and distributed, in whole or in part, without restriction of any   kind, provided that the above copyright notice and this paragraph are   included on all such copies and derivative works.  However, this   document itself may not be modified in any way, such as by removing   the copyright notice or references to the Internet Society or other   Internet organizations, except as needed for the purpose of   developing Internet standards in which case the procedures for   copyrights defined in the Internet Standards process must be   followed, or as required to translate it into languages other than   English.   The limited permissions granted above are perpetual and will not be   revoked by the Internet Society or its successors or assigns.   This document and the information contained herein is provided on an   "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING   TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING   BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION   HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF   MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.Li & Rekhter                 Informational                     [Page 16]

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产**成人网毛片九色| 日韩欧美一区二区视频| 欧美日韩欧美一区二区| 亚洲精品一区二区三区四区高清 | 黑人巨大精品欧美一区| 99re热这里只有精品视频| 欧美一区永久视频免费观看| 国产日韩欧美精品电影三级在线| 亚洲精品乱码久久久久久久久| 蜜臀91精品一区二区三区| 99天天综合性| 国产日产欧美一区二区视频| 手机精品视频在线观看| 日本国产一区二区| 中文字幕av不卡| 国产自产2019最新不卡| 欧美日韩高清影院| 亚洲视频一区二区在线| 福利电影一区二区| 欧美成人一级视频| 秋霞影院一区二区| 欧美麻豆精品久久久久久| 亚洲欧洲制服丝袜| aaa国产一区| 中文字幕在线免费不卡| 国产美女av一区二区三区| 欧美一二区视频| 一区二区三区在线观看动漫| 国产精品18久久久| 久久久久久亚洲综合| 国产在线不卡一卡二卡三卡四卡| 欧美老肥妇做.爰bbww| 天天亚洲美女在线视频| 欧美日韩1234| 石原莉奈在线亚洲二区| 91精品国产色综合久久久蜜香臀| 亚洲国产毛片aaaaa无费看| 欧美系列在线观看| 亚洲www啪成人一区二区麻豆| 色老汉一区二区三区| 亚洲国产日产av| 欧美日本精品一区二区三区| 日韩精品高清不卡| 欧美一区二区精品在线| 国产美女精品一区二区三区| 久久精品一级爱片| av综合在线播放| 一级精品视频在线观看宜春院 | 国产精品一级二级三级| 国产亚洲欧美激情| 91视频国产观看| 亚洲午夜久久久久中文字幕久| 欧美日韩五月天| 美国毛片一区二区三区| 久久亚洲捆绑美女| 成人av在线一区二区| 亚洲综合色自拍一区| 日韩视频在线你懂得| 国产999精品久久| 一区二区激情小说| 日韩精品中文字幕在线不卡尤物| 国产综合色视频| 国产精品久久久久久久久久免费看 | 久久免费视频一区| gogogo免费视频观看亚洲一| 亚洲伊人伊色伊影伊综合网| 日韩一级片网站| 成人久久视频在线观看| 天天综合网天天综合色| 国产精品污网站| 欧美另类z0zxhd电影| 国产成人精品影院| 亚洲一卡二卡三卡四卡五卡| 精品理论电影在线观看| 在线亚洲人成电影网站色www| 久久精品国产免费看久久精品| 国产精品日产欧美久久久久| 欧美日韩不卡一区| av不卡一区二区三区| 亚洲综合色区另类av| www激情久久| 欧美视频一区二区| 国产成人精品一区二区三区网站观看| 一区二区三区色| 国产日韩欧美激情| 欧美一区二区三区日韩视频| av不卡在线观看| 国产在线精品一区在线观看麻豆| 一区二区三区高清在线| 欧美激情一区二区三区全黄 | 99久久国产综合精品麻豆| 日本91福利区| 一区二区三区精品在线| 中文字幕国产一区| 欧美精品一区二区在线播放| 欧美日韩国产综合一区二区| 成人丝袜高跟foot| 国产在线视频一区二区| 日本不卡一区二区三区高清视频| 亚洲天天做日日做天天谢日日欢 | 8x8x8国产精品| 一本色道久久综合亚洲aⅴ蜜桃| 国产一区久久久| 久久er99热精品一区二区| 午夜精品一区在线观看| 一区二区三区四区中文字幕| 中文字幕一区三区| 日本一区二区三区电影| 国产日韩欧美综合在线| 日韩精品资源二区在线| 337p亚洲精品色噜噜噜| 欧美三级三级三级爽爽爽| 在线视频欧美区| 欧美影院一区二区| 欧美日韩亚洲不卡| 欧美一级电影网站| 日韩视频免费观看高清完整版| 欧美午夜精品一区| 欧美性大战久久久久久久| 欧美在线观看你懂的| 欧美三级韩国三级日本一级| 欧美久久久一区| 91麻豆精品91久久久久久清纯| 在线观看91av| 日韩欧美国产电影| 国产欧美精品日韩区二区麻豆天美| 久久久久久久久久久久电影| 国产丝袜欧美中文另类| 国产精品久久久久久久久免费桃花 | 国产成人综合视频| 粉嫩蜜臀av国产精品网站| 成人开心网精品视频| 色婷婷精品大视频在线蜜桃视频| 色欧美片视频在线观看| 欧美精品免费视频| 欧美成人精品福利| 久久精品亚洲国产奇米99| 亚洲人成在线播放网站岛国| 亚洲综合色丁香婷婷六月图片| 日本欧美肥老太交大片| 国产精品自拍一区| 91丨porny丨在线| 欧美嫩在线观看| 久久一区二区三区国产精品| 亚洲男人天堂一区| 视频一区二区中文字幕| 国产露脸91国语对白| 成人福利电影精品一区二区在线观看| 91一区二区在线| 欧美人牲a欧美精品| 久久免费电影网| 亚洲一区二区三区四区不卡| 美女mm1313爽爽久久久蜜臀| www.亚洲人| 欧美日韩成人综合| 国产婷婷精品av在线| 午夜精品久久久久久久久| 国产高清亚洲一区| 欧美性猛交xxxx乱大交退制版| 欧美大片日本大片免费观看| 国产精品成人网| 久久机这里只有精品| 91网站在线播放| 精品国产免费久久 | 麻豆极品一区二区三区| 成人丝袜视频网| 欧美大片免费久久精品三p| 亚洲精品中文字幕在线观看| 国模少妇一区二区三区| 欧美日韩一区二区三区免费看 | 99久久精品国产一区| 欧美手机在线视频| 日本一区二区三区国色天香| 免费精品视频最新在线| 色激情天天射综合网| 国产欧美精品一区aⅴ影院| 日韩av在线发布| 色哟哟精品一区| 国产精品天美传媒| 国产一区美女在线| 日韩一区二区精品| 天天综合日日夜夜精品| 在线观看欧美黄色| 最新久久zyz资源站| 国产一区91精品张津瑜| 精品日韩在线观看| 日韩精品电影在线| 欧美日韩三级在线| 一区二区三区国产| 在线观看一区日韩| 亚洲综合色自拍一区| 91猫先生在线| 亚洲欧美激情插 | 激情综合色丁香一区二区| 欧美福利一区二区| 日韩高清电影一区| 欧美精品亚洲一区二区在线播放| 性做久久久久久久免费看| 欧美日本韩国一区二区三区视频 | 91麻豆精品国产91久久久久|