Why if it is chopped earth worm does not die






Because the nervous system of the worm is widespread in all parts is represented each piece an important head of the worm cut into pieces

MPLS Traffic Engineering—Fast Reroute Link and Node Protection

Prerequisites for MPLS Traffic Engineering—Fast Reroute
Link and Node Protection

Your network must support the following Cisco IOS XE features:
• IP Cisco Express Forwarding
• Multiprotocol Label Switching (MPLS)
Your network must support at least one of the following protocols:
• Intermediate System-to-Intermediate System (IS-IS)
• Open Shortest Path First (OSPF)
Before configuring FRR link and node protection, it is assumed that you have done the following tasks but
you do not have to already have configured MPLS traffic engineering (TE) tunnels:
• Enabled MPLS TE on all relevant routers and interfaces
• Configured MPLS TE tunnels

Restrictions for MPLS Traffic Engineering—Fast Reroute Link
and Node Protection
• Interfaces must use MPLS Global Label Allocation.
• The router’s physical interface for MPLS-TE and Fast RR for Gigabit Ethernet (GE), and Packet over
SONET (POS) is supported for enabling a 50 millisecond (ms) failover. However, the GE
subinterfaces, logical interfaces and copper interface (e.g. Fast Ethernet interface) are not supported
for enabling a 50 ms failover (even though they may be configurable). Also, FRR is not configurable
on ATM interface.
• The FRR link protect mode failover time is independent of the number of prefixes pointing to the link.
• Cisco IOS-XE does not support QoS on MPLS-TE tunnels.
• Backup tunnel headend and tailend routers must implement FRR as described in draft-pan-rsvpfastreroute-
00.txt.
• Backup tunnels are not protected. If an LSP is actively using a backup tunnel and the backup tunnel
fails, the LSP is torn down.
• LSPs that are actively using backup tunnels are not considered for promotion. If an LSP is actively
using a backup tunnel and a better backup tunnel becomes available, the active LSP is not switched to
the better backup tunnel.
• You cannot enable FRR Hellos on a router that also has Resource Reservation Protocol (RSVP)
Graceful Restart enabled.
• MPLS TE LSPs that are FRR cannot be successfully recovered if the LSPs are FRR active and the
Point of Local Repair (PLR) router experiences a stateful switchover (SSO).


Fast Reroute
Fast Reroute (FRR) is a mechanism for protecting MPLS TE LSPs from link and node failures by locally
repairing the LSPs at the point of failure, allowing data to continue to flow on them while their headend
routers attempt to establish new end-to-end LSPs to replace them. FRR locally repairs the protected LSPs
by rerouting them over backup tunnels that bypass failed links or node.
Link Protection
Backup tunnels that bypass only a single link of the LSP’s path provide link protection. They protect LSPs
if a link along their path fails by rerouting the LSP’s traffic to the next hop (bypassing the failed link).
These are referred to as next-hop (NHOP) backup tunnels because they terminate at the LSP’s next hop
beyond the point of failure. The figure below illustrates an NHOP backup tunnel.



Node Protection
FRR provides node protection for LSPs. Backup tunnels that bypass next-hop nodes along LSP paths are
called next-next-hop (NNHOP) backup tunnels because they terminate at the node following the next-hop
node of the LSP paths, thereby bypassing the next-hop node. They protect LSPs if a node along their path
fails by enabling the node upstream of the failure to reroute the LSPs and their traffic around the failed
node to the next-next hop. FRR supports the use of RSVP Hellos to accelerate the detection of node
failures. NNHOP backup tunnels also provide protection from link failures, because they bypass the failed
link and the node.

The figure below illustrates an NNHOP backup tunnel.


If an LSP is using a backup tunnel and something changes so that the LSP is no longer appropriate for the
backup tunnel, the LSP is torn down. Such changes are the following:
• Backup bandwidth of the backup tunnel is reduced.
• Backup bandwidth type of backup tunnel is changed to a type that is incompatible with the primary
LSP.
• Primary LSP is modified so that FRR is disabled. (The no mpls traffic-eng fast-reroute command is
entered.)
Bandwidth Protection
NHOP and NNHOP backup tunnels can be used to provide bandwidth protection for rerouted LSPs. This is
referred to as backup bandwidth. You can associate backup bandwidth with NHOP or NNHOP backup
tunnels. This informs the router of the amount of backup bandwidth a particular backup tunnel can protect.
When a router maps LSPs to backup tunnels, bandwidth protection ensures that an LSP uses a given
backup tunnel only if there is sufficient backup bandwidth. The router selects which LSPs use which
backup tunnels in order to provide maximum bandwidth protection. That is, the router determines the best
way to map LSPs onto backup tunnels in order to maximize the number of LSPs that can be protected. For
information about mapping tunnels and assigning backup bandwidth, see the "Backup Tunnel Selection
Procedure" section.
LSPs that have the “bandwidth protection desired” bit set have a higher right to select backup tunnels that
provide bandwidth protection; that is, those LSPs can preempt other LSPs that do not have that bit set. For
more information, see the "Prioritizing Which LSPs Obtain Backup Tunnels with Bandwidth Protection"
section.
RSVP Hello Operation
RSVP Hello enables RSVP nodes to detect when a neighboring node is not reachable. This provides nodeto-
node failure detection. When such a failure is detected, it is handled in a similar manner as a link-layer
communication failure.

RSVP Hello can be used by FRR when notification of link-layer failures is not available (for example, with
Fast Ethernet), or when the failure detection mechanisms provided by the link layer are not sufficient for
the timely detection of node failures.
A node running Hello sends a Hello Request to a neighboring node every interval. If the receiving node is
running Hello, it responds with Hello Ack. If four intervals pass and the sending node has not received an
Ack or it receives a bad message, the sending node declares that the neighbor is down and notifies FRR.
There are two configurable parameters:
• Hello interval--Use the ip rsvp signalling hello refresh interval command.
• Number of acknowledgment messages that are missed before the sending node declares that the
neighbor is down--Use the ip rsvp signalling hello refresh misses command
RSVP Hello Instance
A Hello instance implements RSVP Hello for a given router interface IP address and remote IP address. A
large number of Hello requests are sent; this puts a strain on the router resources. Therefore, create a Hello
instance only when it is necessary and delete it when it is no longer needed.
There are two types of Hello instances:
• RSVP Hello Instance,
• RSVP Hello Instance,
Active Hello Instances
If a neighbor is unreachable when an LSP is ready to be fast rerouted, an active Hello instance is needed.
Create an active Hello instance for each neighbor with at least one LSP in this state.
Active Hello instances periodically send Hello Request messages, and expect Hello Ack messages in
response. If the expected Ack message is not received, the active Hello instance declares that the neighbor
(remote IP address) is unreachable (lost). LSPs traversing that neighbor may be fast rerouted.
If there is a Hello instance with no LSPs for an unreachable neighbor, do not delete the Hello instance.
Convert the active Hello instance to a passive Hello instance because there may be an active instance on the
neighboring router that is sending Hello requests to this instance.
Passive Hello Instances
Passive Hello instances respond to Hello Request messages (sending Ack messages), but do not initiate
Hello Request messages and do not cause LSPs to be fast rerouted. A router with multiple interfaces can
run multiple Hello instances to different neighbors or to the same neighbor.
A passive Hello instance is created when a Hello Request is received from a neighbor with a source IP
address/destination IP address pair in the IP header for which a Hello instance does not exist.
Delete passive instances if no Hello messages are received for this instance within 10 minutes.
Backup Tunnel Support
Backup tunnel support has the following capabilities:
Backup Tunnels Can Terminate at the Next-Next Hop to Support FRR
Backup tunnels that terminate at the next-next hop protect both the downstream link and node. This
provides protection for link and node failures. For more detailed information, see the Node Protection,
Multiple Backup Tunnels Can Protect the Same Interface
There is no limit (except memory limitations) to the number of backup tunnels that can protect a given
interface. In many topologies, support for node protection requires supporting multiple backup tunnels per
protected interface. These backup tunnels can terminate at the same destination or at different destinations.
That is, for a given protected interface, you can configure multiple NHOP or NNHOP backup tunnels. This
allows redundancy and load balancing.
In addition to being required for node protection, the protection of an interface by multiple backup tunnels
provides the following benefits:
• Redundancy--If one backup tunnel is down, other backup tunnels protect LSPs.
• Increased backup capacity--If the protected interface is a high-capacity link and no single backup path
exists with an equal capacity, multiple backup tunnels can protect that one high-capacity link. The
LSPs using this link will fail over to different backup tunnels, allowing all of the LSPs to have
adequate bandwidth protection during failure (rerouting). If bandwidth protection is not desired, the
router spreads LSPs across all available backup tunnels (that is, there is load balancing across backup
tunnels). For a more detailed explanation, see the Backup Tunnel Selection Procedure,
Backup Tunnels Provide Scalability
A backup tunnel can protect multiple LSPs. Furthermore, a backup tunnel can protect multiple interfaces.
This is called many-to-one (N:1) protection. An example of N:1 protection is when one backup tunnel
protects 5000 LSPs, each router along the backup path maintains one additional tunnel.
One-to-one protection is when a separate backup tunnel must be used for each LSP needing protection. N:1
protection has significant scalability advantages over one-to-one (1:1) protection. An example of 1:1
protection is when 5000 backup tunnels protect 5000 LSPs, each router along the backup path must
maintain state for an additional 5000 tunnels.

ICDL Module 1 (IT) lec (5)

1.8 Copyright and the Law
1.8.1 Copyright
1.8.1.1 Understand the concept of copyright when applied to software,
and also to files such as: graphics, text, audio, video. Understand
copyright issues involved in downloading information from the Internet.
Software Copyright Issues
• Most programs which you purchase are copyrighted and you must not copy them. If you
do so you may be breaking the law and if caught, you could find yourself being
prosecuted. Many people will buy a copy of a game and make a copy for their friends or
other family member. This is also normally unlawful. Even lending your program disks or
CD-ROM to other people may be breaking the law in most cases. There are numerous
organisations, such as FAST (the Federation Against Software Theft), which are
dedicated to preventing the illegal copying of software. In a business situation, if your
manager tells you to copy software, ALWAYS first make sure that you have a licence
which entitles you to copy the software, because in many countries, you will be
personally liable for damages.
• Most text which you will find on the Internet is copyrighted. Never copy text without
authority to do so and always quote your sources.
• There are many sites offering free graphics and clipart. Some are genuine and have the
authority to offer you a free download of images. Many sites however may not have this
authority. Popular examples are pictures, sound clips, or movie clips from Star Trek. If
you visit the official Star Trek site (www.startrek.com) you will see that use of images,
and even the name 'Star Trek' is protected and may not be used on 'fan sites'. Even
downloading sound clips to replace the bleeps which Microsoft Windows makes is often
illegal. Some sites even allow the 'free' download for complete films or music tracks. If
you can download a film for free before it is even officially available on video/DVD, it is a
pretty good bet that the site is unauthorised. Cover yourself. Get written permission to
used downloaded materials and 'if in doubt - don't' is the safe rule. Because CD-ROM
writers have become so widely available, it has become possible to copy entire CDROMs
which can contain software, games or data. Do not do this. Always be careful of
software which you may find advertised at very cheap prices, it may be illegally copied.
More Information: The Federation Against Software Theft http://www.fast.org.uk
What are site licences?
• Many large companies do not go out and buy a certain amount of 'shrink-wrapped'
copies of each software product which they need, instead they will buy a site licence.
These site licences are different in their small print, but generally mean that the
companies purchasing the licence can make a fixed numbers of copies available to their
staff, normally via a company network.
1.8.1.2 Understand copyright issues associated with using and
distributing materials stored on removable media such as CD’s, Zip
disks, diskettes.
Copyright Issues
• Transferring files across a LAN:
You need to be careful that you do not accidentally make copies of software via your
Local Area Network (unless of course you are authorised to make such copies).
• Downloading files from the Internet:
You need to be VERY careful when downloading files from the Internet. Just because a
site may say you are free to download materials from the site, does not necessary mean
that the owners of the Internet site have the authority to allow you to do this. It is possible
to download entire software packages from the net, even entire movie films. In many
cases however it is not legal to do so.
• Copying diskettes / CD-ROMs / DVD / ZIP disks:
If you purchase software, you may, in some cases be allowed to make a single, backup
copy of disk. You are not allowed to distribute copies to family and friends. You are
certainly not allowed to copy and re-sell commercial software.
• Freeware:
This is software which can be copied or downloaded for free. It is often fully functional.
Examples may include software developed by organisations such as Universities, where
the aim was not to profit from the software. It is very important not to confuse freeware
and shareware.
• Shareware:
This is where you can use software for a free trial period. Sometimes the shareware
versions may be fully functional, but after a time period will either start to display an
annoying message, asking you to register (i.e. pay for) your software, or in some cases it
may stop working altogether after the trial period. This 'try before you buy' method of
getting software is becoming increasing popular with the major software suppliers.
• User Licences:
If you have more than one PC, then you can either purchase a separate copy of the
software you require for each PC, or better: you can purchase a user licence. This user
licence allows you to make copies and install them on each computer. The more copies
you make the more the user licence will cost, but the cheaper the effective cost per PC.
1.8.1.3 Know how to check the Product ID number for a software
product. Understand the terms shareware, freeware, end-user licence
agreement.
How to check a software Product ID
• Normally if you click on the Help drop down menu within an application, there will be a
command such as About. Clicking on this option will often display your software product
identification number.
What is freeware?
• Some software is made freely available. Demonstration disks often come under this
category. In addition, a lot of software is produced by the educational community and is
made freely available. Always read any licences supplied with such software very
carefully before use.
What is shareware?
• Shareware is software which is freely available and is designed to let you use the
product for free, for a limited period while you decide if you like it or not. After this period,
you must legally either remove it, or pay an amount to the producers of the product.
More information: http://shareware.cnet.com
What about software which you find on the Internet
• There are some sites on the Internet run by dubious organisations which might make
copies of commercial software freely available. If you download any software from the
Internet, make sure that it is legal.
What is an end-user licence agreement?
• Normally when you install software these days there is a step within the installation
routine in which you have to agree to be bound by the end user licence agreement. This
agreement can be very large and is drawn up to protect the manufacturers of a product
from being prosecuted due to faulty software. It also defines how many copies of the
software you are entitled to. I recently printed out a Microsoft end user agreement and it
was over 15 pages long.
1.8.2 Data Protection Legislation
1.8.2.1 Know about data protection legislation or conventions in your
country. Understand the implications of data protection legislation for
data subjects and data holders. Describe some of the uses of personal
data.
Data Protection and Privacy Issues
• If your computer system holds information about individuals, then you have a moral and
legal duty to treat that information with respect. For instance if a police force computer is
used by unscrupulous people to gain unauthorised information about a person’s private
life, that would be a clear breach of trust. In the same way doctors, government
departments and credit agencies often hold vast amounts of information about the
general public, which is both sensitive and private. In a free society you have the right to
ensure that the information held about you is not abused. In many countries, this right is
enshrined under data protection laws.
Data Protection Legislation
• Listed below are the main principles of the UK Data Protection Act. This is meant as an
illustration only and should NOT be used for determining liability or operating principles.
You must read the full details of the act if you are considering legal implementation. For
more information about the UK data protection act please access the following Web
sites:
http://www.hmso.gov.uk/acts/acts1984/1984035.htm#aofs
http://www.pro.gov.uk/recordsmanagement/dp/default.htm
The information to be contained in personal data shall be obtained, and personal data
shall be processed, fairly and lawfully.
Personal data shall be held only for one or more specified and lawful purposes.
Personal data held for any purpose or purposes shall not be used or disclosed in any
manner incompatible with that purpose or those purposes.
Personal data held for any purpose or purposes shall be adequate, relevant and not
excessive in relation to that purpose or those purposes.
Personal data shall be accurate and, where necessary, kept up to date.
Personal data held for any purpose or purposes shall not be kept for longer than is
necessary for that purpose or those purposes.
An individual shall be entitled at reasonable intervals and without undue delay or
expense to be informed by any data user whether he holds personal data of which that
individual is the subject; and access to any such data held by a data user; and where
appropriate, to have such data corrected or erased.
Personal data held by data users or in respect of which services are provided by persons
carrying on computer bureau. Appropriate security measures shall be taken against
unauthorised access to, or alteration, disclosure or destruction of, personal data and
against accidental loss or destruction of personal data.