Why is MPLS considered as a Layer 2.5 networking protocol?

Asked by Last Modified  

Follow 3
Answer

Please enter your answer

Trainer

MPLS is considered as 2.5 Layer protocol due to its special feature of LDP protocol. LDP stands for Label Distribution protocol. If the network is built up with MPLS network. Let us assume that A network is in some ABC location and Z network is in some XYZ location. Also, these A and Z networks...
read more
MPLS is considered as 2.5 Layer protocol due to its special feature of LDP protocol. LDP stands for Label Distribution protocol. If the network is built up with MPLS network. Let us assume that A network is in some ABC location and Z network is in some XYZ location. Also, these A and Z networks are 10 to 20 hosp away from each other with redundant paths. When the initial packet from either A to Z or vice versa it will be using HARDWARE BASED PACKET FORWARDING using IP Routing table. After this, each route in the MPLS network will be logically linked with some kind of labels which understand by all MPLS routers. So after the 1st successful conversation between A to Z network or vice versa, the data/packet transfer will be based on Labels. So Routers doesn't want to look at the L3/Routing/Forwarding table every time for the packet forwarding. This increases the Router's performance and reduces the memory consumption with fast packet transmission. MPLS is seeking the help of IP routing table initially for the Label distribution for the respective routes and then after the Labels are just like the Layer 2 address. So MPLS is operating with the help of both Layer 2 as well as Layer 3, so this is why MPLS is called as Layer 2.5 protocol. read less
Comments

M.Tech in Electrical Engineering from IIT Kanpur

Well, it’s pretty clear that it has no true network layer addressing and sits below the network layer. On the flip side, it clearly sits above the data link layer. So if it’s between layer 3 and layer 2, we need another layer. Hence 2.5.
Comments

Trainer

ha ha .. good question.. Layer - 2 is L2 Protocol.. MPLS essentially L2 Protocol but it has some additional stuffs includes.. thats the reason they are being called as 2.5 :)
Comments

View 1 more Answers

Related Questions

What OSI layer uses frames: the data link layer or the physical layer?
Protocols running at Data link layer is responsible to encapsulate the frames from physical layer received bits format.
Honey
0 0
6
How can I find the IP address of my access point?
Check in LAN options. It may varies by model
Abhijith
0 0
5
How will you teach me? Is this coaching free or paid?
It is paid and I can teach you online complete basics of computers.
Deepan

Now ask question in any of the 1000+ Categories, and get Answers from Tutors and Trainers on UrbanPro.com

Ask a Question

Related Lessons

OSI Model Layers Learning Technique
In computer networking, the most important essential thing that every student must know is the OSI model. Though the OSI model is a reference model, and there is no practical use of this model in the industry....

Ethical hacking : Important points for beginners
Dear passionate learners, I am posting below lesson to create enthusiasm among you all for learning ethical hacking . A beginner in Ethical Hacking is always in dilemma. Below are some misconceptions,...

Networking for All - Beginning with Basics
Introduction What is Network?A network is a group of two or more computer systems linked together. In general Networking means connectivity. Why Networking?Computers are interconnected for serving...

A note on working of Transmission Control Protocol in Computer Networks.
TCP Connection establishment and termination TCP is one of theTCP is connection oriented protocol and reliable protocol. It originated in the initial network implementation in which it complemented the...

NETWORKING BASIC
Block-1 Following are the essential elements of communication system. Information source: Source that produces a message Transmitter: An element that functions on the message to generate a signal...

Sics Shah Institute Of Computer Science

0 0
0

Recommended Articles

Business Process outsourcing (BPO) services can be considered as a kind of outsourcing which involves subletting of specific functions associated with any business to a third party service provider. BPO is usually administered as a cost-saving procedure for functions which an organization needs but does not rely upon to...

Read full article >

Hadoop is a framework which has been developed for organizing and analysing big chunks of data for a business. Suppose you have a file larger than your system’s storage capacity and you can’t store it. Hadoop helps in storing bigger files than what could be stored on one particular server. You can therefore store very,...

Read full article >

Information technology consultancy or Information technology consulting is a specialized field in which one can set their focus on providing advisory services to business firms on finding ways to use innovations in information technology to further their business and meet the objectives of the business. Not only does...

Read full article >

Almost all of us, inside the pocket, bag or on the table have a mobile phone, out of which 90% of us have a smartphone. The technology is advancing rapidly. When it comes to mobile phones, people today want much more than just making phone calls and playing games on the go. People now want instant access to all their business...

Read full article >

Looking for Computer Networking classes?

Learn from the Best Tutors on UrbanPro

Are you a Tutor or Training Institute?

Join UrbanPro Today to find students near you